Skip to content

JWTKit is a powerful web-based JWT hacking toolkit designed for ethical hackers and security researchers. Built with Flask and React, it allows you to analyze, manipulate, and exploit JSON Web Tokens for penetration testing. Ideal for discovering JWT vulnerabilities in web apps. Fast, intuitive, and open-source.

Notifications You must be signed in to change notification settings

eshanized/JWTKit

Repository files navigation

JWTKit - The Ultimate JWT Security Toolkit

JWTKit Logo

JWTKit

Comprehensive JWT Security Analysis & Testing Platform


🚀 Features

Feature Description
🔍 JWT Decoder Decode and analyze JWT structure with color-coded visualization
🛡️ Vulnerability Scanner Detect 20+ common JWT security issues
🔐 Signature Verification Support for HS256, RS256, ES256 algorithms
Performance Testing Benchmark JWT processing speed
📊 Security Reports Generate detailed security assessment reports
🧪 Test Suite 50+ pre-built test cases for JWT validation
🎭 Attack Vectors Test various JWT attack vectors (Algorithm Confusion, Brute Force, Key Injection)

📦 Installation

# Clone the repository
git clone https://github.com/eshanized/JWTKit.git
cd JWTKit

# Install backend dependencies
pip install -r requirements.txt

# Install frontend dependencies
cd frontend
npm install --legacy-peer-deps
cd ..

# Start the backend
python app.py

# Start the frontend (in a new terminal)
cd frontend
npm start

🖥️ Modern Frontend UI

The JWTKit frontend features a modern, responsive UI built with:

  • Material UI - Sleek component library for consistent design
  • Framer Motion - Smooth animations for a dynamic feel
  • Dark/Light Mode - Toggle between themes for comfortable viewing
  • Interactive Editors - Visually edit JWT headers and payloads
  • Reactive Visualization - Real-time updates as you modify tokens

The interface is designed to be intuitive and user-friendly while providing powerful features for both security professionals and developers.


🌟 Features in Detail

Advanced Security Analysis

  • Algorithm confusion testing to detect signature bypasses
  • Signature verification with multiple algorithms
  • Expiration and claim validation
  • Issuer and audience checks for token authenticity

Offensive Security Tools

  • JWT cracking with dictionary attacks
  • Key injection attacks simulation
  • JWKS URL spoofing testing
  • Expiration-bypass techniques

Developer Tools

  • JWT generator with customizable payloads
  • Payload and header editors for token manipulation
  • Signature brute-forcing engine for security testing
  • Performance benchmarking for token processing speed

🤝 Contributing

We welcome contributions! Follow these steps:

  1. Fork the project
  2. Create your feature branch (git checkout -b feature/AmazingFeature)
  3. Commit your changes (git commit -m 'Add some amazing feature')
  4. Push to the branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request and describe your changes

📅 Roadmap

  • Core JWT analysis
  • Vulnerability scanning
  • Modern UI implementation
  • Mobile app support
  • CI/CD integration
  • Comprehensive API documentation

❓ FAQ

Q: Is JWTKit free to use?
A: Yes, JWTKit is fully open-source under the MIT license.

Q: Can I use JWTKit in production?
A: JWTKit is designed primarily for testing and security analysis, not for production use.


📄 License

Distributed under the MIT License. See the LICENSE file for details.


📬 Contact

Eshanized
GitHub: @eshanized
Email: m.eshanized@gmail.com

Project Link: https://github.com/eshanized/JWTKit


🙏 Acknowledgements


Made with ❤️ by the JWTKit Team

About

JWTKit is a powerful web-based JWT hacking toolkit designed for ethical hackers and security researchers. Built with Flask and React, it allows you to analyze, manipulate, and exploit JSON Web Tokens for penetration testing. Ideal for discovering JWT vulnerabilities in web apps. Fast, intuitive, and open-source.

Topics

Resources

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Contributors 3

  •  
  •  
  •