A simple tool to exploit JWT vulnerabilities.
- None algorithm attack
- KID Header injection
- Algorithm confusion
If you need to perform another attack, you can use the "custom" function to modify the fields you want and choose your own signing key.
A simple tool to exploit JWT vulnerabilities.
If you need to perform another attack, you can use the "custom" function to modify the fields you want and choose your own signing key.