jwt-hack icon indicating copy to clipboard operation
jwt-hack copied to clipboard

🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)

Results 14 jwt-hack issues
Sort by recently updated
recently updated
newest added

In payloads.go, when you encode the JWT after tampering with it, you encode with `b64.StdEncoding.EncodeToString()`. However, you should use `base64.RawURLEncoding.EncodeToString()`. The second method strips the padding from the base64 (i.e....

JSON Unmarshal Error ![image](https://user-images.githubusercontent.com/43526141/147476213-bca4b8aa-fcb6-4c66-963f-17fe6a59df79.png)

기능 - [ ] Show JWT info => e.g convert expire time - [x] Signature secret Bruteforce - [x] Signature secret Dictionary attack - [x] None algorithm testing - [...

documentation

- For some reason the tool kills the process after some time processing rockyou.txt, since it's 14m+ password there, but when I tried a 10m+ list it worked fine without...

![Snipaste_2024-01-10_20-01-15](https://github.com/hahwul/jwt-hack/assets/31209515/f24592de-d83a-4e0c-a848-986662beb6bd) When running in brute mode for a period of time, this error will appear.

Added logic to use the max flag, since the max flag was not used in bruteforce.

similar issue https://github.com/hahwul/dalfox/issues/134

bug

- Signature Algorithm - Encryption Algorithm - Key Management Algorithm ref: https://github.com/jwtk/jjwt