Xjwt
Advanced JWT decoding & cracking toolkit with a user-friendly UI for security testing
Install / Use
/learn @exploit-forge/XjwtREADME
🔐 JWT Security Checker
A comprehensive web-based platform for JSON Web Token security testing and analysis
Built by Al-Amir Badmus for Exploit-forge LTD
JWT Security Checker is a professional-grade security testing platform designed for penetration testers, security researchers, and developers to analyze and test JSON Web Token implementations. Built with modern web technologies and powered by industry-standard tools.
✨ Features
🔍 JWT Analysis & Manipulation
- Real-time JWT Decoder/Encoder - Decode, edit, and encode JWTs with live preview
- Client-side Processing - All decoding/encoding happens in the browser; tokens stay on your device
- Signature Verification - Verify token signatures with custom secrets
- Algorithm Support - Full symmetric (HS256/384/512) and asymmetric (RS256/384/512, ES256/384/512) support, plus none
- Claims Editor - Interactive JSON and table view for easy claims modification
⚡ Security Testing Tools
- JWT Secret Cracking - Brute-force weak secrets using dictionary attacks
- 100,000+ Default Wordlist - Comprehensive built-in wordlist for common secrets
- Custom Wordlist Support - Upload your own wordlists (up to 2MB)
- Real-time Progress - Live attack logs and progress monitoring
- Algorithm Confusion Testing - Test for algorithm switching vulnerabilities
🛠 Pentesting Tool Collection
- JWTTool Integration - Powered by the renowned jwt_tool by @ticarpi
- Burp Suite Extensions - JWT Editor, Hackvertor, JWT4B integration guides
- Hashcat Support - GPU-accelerated cracking capabilities
- Multiple Cracking Tools - Comprehensive toolkit for various attack vectors
🎨 Modern User Interface
- JWT.io-inspired Design - Familiar interface for security professionals
- Dark/Light Theme - Comfortable viewing in any environment
- Responsive Design - Works seamlessly on desktop, tablet, and mobile
- Real-time Updates - Live feedback during security testing operations
🛡️ JWT Scanner
- Automated JWT Vulnerability Scanner - Scan tokens for common vulnerabilities (none algorithm, weak secrets, insecure claims, etc.)
- Detailed Security Reports - Get actionable insights and recommendations
- One-Click Scan - Instantly analyze any JWT for security issues
🚀 Quick Start
Prerequisites
- Docker & Docker Compose
- Git
Installation
-
Clone the repository
git clone https://github.com/exploit-forge/xjwt.git cd xjwt -
Start with Docker Compose
docker-compose up -d -
Access the application
- Frontend: http://localhost:3000
- Backend API: http://localhost:8000
That's it! The application will be running with all services configured.
📖 Usage Guide
Basic JWT Operations
-
Decode a JWT
- Paste your JWT token in the input field
- View decoded header and payload in real-time
- Switch between JSON and table view
-
Verify Signature
- Enter the secret key used to sign the JWT
- Select the appropriate algorithm
- Click "Verify Signature" to check validity
-
Generate New Token
- Edit header and payload as needed
- Provide a secret key
- Click "Generate Token" to create a new JWT
Security Testing
-
Crack JWT Secrets
- Navigate to "JWT Security Testing"
- Paste the target JWT token
- Optional: Upload custom wordlist
- Click "Start Attack" and monitor progress
-
Scan JWT for Vulnerabilities
- Go to the "JWT Scanner" section
- Paste or upload your JWT token
- Click "Scan Token"
- Review the detailed security report and recommendations
🛡️ Security Features
Privacy Protection
- ✅ No permanent data storage
- ✅ Automatic cleanup of temporary files
- ✅ Server-side processing with immediate deletion
- ✅ No long-term retention of sensitive information
- ✅ Decode/encode operations run entirely in the frontend, keeping tokens local to your browser
🤝 Contributing
We welcome contributions! Please see our Contributing Guide for details.
Development Workflow
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
📄 License
This project is licensed under the MIT License - see the LICENSE file for details.
🙏 Acknowledgments
- jwt_tool by @ticarpi - The powerful JWT testing toolkit that powers our cracking capabilities
- JWT.io - Inspiration for the user interface design
- Security Community - For continuous feedback and improvement suggestions
🔗 Links
- 🌐 Live Demo: https://xjwt.io
- 📚 Documentation: https://docs.exploit-forge.com
- 🐛 Bug Reports: GitHub Issues
- 💬 Discussions: GitHub Discussions
📞 Support
- Website: https://exploit-forge.com
- Email: security@exploit-forge.com
- Twitter: @ExploitforgeLTD
- LinkedIn: Exploit-forge LTD
<div align="center"> <sub>Built with ❤️ by <a href="https://exploit-forge.com">Exploit-forge LTD</a></sub> </div>
