tool to test and exploit common JWT security issues such as weak signing keys, alg:none bypasses, and RS/HS confusion attacks.
-
Updated
Jul 5, 2025 - Python
tool to test and exploit common JWT security issues such as weak signing keys, alg:none bypasses, and RS/HS confusion attacks.
A comprehensive JWT attack CLI covering every major vulnerability class — from alg:none bypass to RS256→HS256 algorithm confusion, HMAC secret bruteforce, kid header injection (SQLi + path traversal), jku/x5u spoofing with built-in JWKS server, and full token forgery. Built for bug bounty hunters and red teamers.
Add a description, image, and links to the jwt-attacks topic page so that developers can more easily learn about it.
To associate your repository with the jwt-attacks topic, visit your repo's landing page and select "manage topics."