A comprehensive web-based platform for JSON Web Token security testing and analysis
Built by Al-Amir Badmus for Exploit-forge LTD
JWT Security Checker is a professional-grade security testing platform designed for penetration testers, security researchers, and developers to analyze and test JSON Web Token implementations. Built with modern web technologies and powered by industry-standard tools.
- Real-time JWT Decoder/Encoder - Decode, edit, and encode JWTs with live preview
- Client-side Processing - All decoding/encoding happens in the browser; tokens stay on your device
- Signature Verification - Verify token signatures with custom secrets
- Algorithm Support - Full symmetric (HS256/384/512) and asymmetric (RS256/384/512, ES256/384/512) support, plus none
- Claims Editor - Interactive JSON and table view for easy claims modification
- JWT Secret Cracking - Brute-force weak secrets using dictionary attacks
- 100,000+ Default Wordlist - Comprehensive built-in wordlist for common secrets
- Custom Wordlist Support - Upload your own wordlists (up to 2MB)
- Real-time Progress - Live attack logs and progress monitoring
- Algorithm Confusion Testing - Test for algorithm switching vulnerabilities
- JWTTool Integration - Powered by the renowned jwt_tool by @ticarpi
- Burp Suite Extensions - JWT Editor, Hackvertor, JWT4B integration guides
- Hashcat Support - GPU-accelerated cracking capabilities
- Multiple Cracking Tools - Comprehensive toolkit for various attack vectors
- JWT.io-inspired Design - Familiar interface for security professionals
- Dark/Light Theme - Comfortable viewing in any environment
- Responsive Design - Works seamlessly on desktop, tablet, and mobile
- Real-time Updates - Live feedback during security testing operations
- Automated JWT Vulnerability Scanner - Scan tokens for common vulnerabilities (none algorithm, weak secrets, insecure claims, etc.)
- Detailed Security Reports - Get actionable insights and recommendations
- One-Click Scan - Instantly analyze any JWT for security issues
- Docker & Docker Compose
- Git
-
Clone the repository
git clone https://github.com/exploit-forge/xjwt.git cd xjwt -
Start with Docker Compose
docker-compose up -d
-
Access the application
- Frontend: http://localhost:3000
- Backend API: http://localhost:8000
That's it! The application will be running with all services configured.
-
Decode a JWT
- Paste your JWT token in the input field
- View decoded header and payload in real-time
- Switch between JSON and table view
-
Verify Signature
- Enter the secret key used to sign the JWT
- Select the appropriate algorithm
- Click "Verify Signature" to check validity
-
Generate New Token
- Edit header and payload as needed
- Provide a secret key
- Click "Generate Token" to create a new JWT
-
Crack JWT Secrets
- Navigate to "JWT Security Testing"
- Paste the target JWT token
- Optional: Upload custom wordlist
- Click "Start Attack" and monitor progress
-
Scan JWT for Vulnerabilities
- Go to the "JWT Scanner" section
- Paste or upload your JWT token
- Click "Scan Token"
- Review the detailed security report and recommendations
- ✅ No permanent data storage
- ✅ Automatic cleanup of temporary files
- ✅ Server-side processing with immediate deletion
- ✅ No long-term retention of sensitive information
- ✅ Decode/encode operations run entirely in the frontend, keeping tokens local to your browser
We welcome contributions! Please see our Contributing Guide for details.
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
- jwt_tool by @ticarpi - The powerful JWT testing toolkit that powers our cracking capabilities
- JWT.io - Inspiration for the user interface design
- Security Community - For continuous feedback and improvement suggestions
- 🌐 Live Demo: https://xjwt.io
- 📚 Documentation: https://docs.exploit-forge.com
- 🐛 Bug Reports: GitHub Issues
- 💬 Discussions: GitHub Discussions
- Website: https://exploit-forge.com
- Email: security@exploit-forge.com
- Twitter: @ExploitforgeLTD
- LinkedIn: Exploit-forge LTD