Skip to content

dr34mhacks/jwtauditor

Repository files navigation

🔐 JWTAuditor - Advanced JWT Pentesting Platform

JWTAuditor Logo

Professional JWT security testing platform for penetration testers and cybersecurity professionals

Live Demo GitHub Stars GitHub Issues License

Decode • Analyze • Exploit • Secure

🚀 What is JWTAuditor?

JWTAuditor is a comprehensive, 100% client-side JWT (JSON Web Token) security testing platform designed by penetration testers, for penetration testers. Born out of real-world frustrations with existing tools, JWTAuditor provides everything you need to audit JWT implementations without compromising your data privacy.

✨ Key Features

  • 🔍 Advanced Security Analysis - Automated vulnerability detection with detailed explanations
  • Secret Bruteforcing - Test against common secrets and custom wordlists
  • ✏️ JWT Editor - Modify tokens with support for various signing algorithms
  • 🔧 JWT Generator - Create tokens from scratch with RSA key generation
  • 🎯 Advanced Attack Platform - 7 specialized attack modules for comprehensive testing
  • 📚 Comprehensive Documentation - Learn JWT security with our detailed guides
  • 🔒 100% Client-Side - Your tokens never leave your browser

🎯 Why JWTAuditor?

The Problem We Solved

During penetration testing engagements, we constantly encountered JWT tokens but struggled with:

  • Complex tools requiring server-side processing
  • Inconsistent tooling across different environments
  • Privacy concerns with online JWT tools
  • Limited vulnerability detection capabilities
  • Poor documentation and learning resources

Our Solution

JWTAuditor addresses all these pain points with:

  • Privacy-First Design - All processing happens locally in your browser
  • Comprehensive Analysis - Detects 15+ vulnerability types automatically
  • Educational Value - Each finding includes detailed explanations and remediation advice
  • Professional Grade - Built by experienced pentesters who understand real-world needs

🛠️ Features Deep Dive

🔍 Security Analyzer

  • Algorithm vulnerability detection (none, weak algorithms, confusion attacks)
  • Sensitive data exposure (PII, credentials, credit cards)
  • Missing security claims (exp, iss, aud, jti)
  • Header injection vulnerabilities (kid parameter attacks)
  • Token lifetime and replay attack analysis
  • 15+ security checks with detailed remediation guidance

🎯 Advanced Attack Platform

  • None Algorithm Bypass - Remove signature verification completely
  • Algorithm Confusion - Convert RS256 to HS256 with 14+ variations
  • KID Parameter Injection - 47+ payloads for path traversal and command injection
  • JKU/X5U Manipulation - Remote key injection with automatic RSA key generation
  • JWK Header Injection - Embed malicious public keys directly in token headers
  • Privilege Escalation - Systematic claim manipulation for privilege escalation
  • Claim Spoofing - Advanced payload generation for identity manipulation

⚡ Secret Bruteforcer

  • Built-in JWT secrets wordlist (1000+ common secrets)
  • Custom wordlist support with file upload
  • Real-time progress tracking
  • Supports HS256, HS384, HS512 algorithms
  • Web Worker implementation for optimal performance

✏️ JWT Editor & Generator

  • Visual JSON editor with syntax highlighting
  • Support for symmetric (HS*) and asymmetric (RS*) algorithms
  • RSA key pair generation for testing
  • Signature verification capabilities
  • Token manipulation for exploit development

📚 Documentation Hub

  • JWT fundamentals and best practices
  • Comprehensive vulnerability guide
  • Attack technique explanations with step-by-step guides
  • Secure implementation guidelines
  • Tool-specific usage guides

🚀 Quick Start

Option 1: Use Online (Recommended)

Visit jwtauditor.com and start testing immediately!

Option 2: Run with Docker (Recommended for Local)

# Clone the repository
git clone https://github.com/dr34mhacks/jwtauditor.git
cd jwtauditor

# Build and run with Docker Compose (easiest)
docker-compose up -d

# Or build and run manually
docker build -t jwtauditor .
docker run -d -p 8080:80 --name jwtauditor-app jwtauditor

# Open in browser
open http://localhost:8080

Option 3: Run Locally (Development)

# Clone the repository
git clone https://github.com/dr34mhacks/jwtauditor.git
cd jwtauditor

# Serve locally (Python 3)
python -m http.server 8000

# Or with Node.js
npx serve .

# Open in browser
open http://localhost:8000

🐳 Docker Features

  • Production-ready Nginx server with optimized configuration
  • Security headers and CSP policies configured
  • Gzip compression for better performance
  • Health checks for monitoring
  • Static asset caching for faster loading
  • Clean container with unnecessary files removed

🤝 Contributing

We welcome contributions from the security community! Here's how you can help:

🐛 Report Issues

Found a bug or have a feature request? Open an issue and let us know!

When reporting issues, please include:

  • Browser version and operating system
  • Steps to reproduce the issue
  • Expected vs actual behavior
  • Screenshots if applicable

🤝 Community

An open-source project built by security researchers for the cybersecurity community

📜 License

This project is licensed under the MIT License - see the LICENSE file for details.

⚖️ Legal Disclaimer

JWTAuditor is intended for authorized security testing and educational purposes only. Users are responsible for ensuring they have proper authorization before testing any systems. The developers are not responsible for any misuse of this tool.

🙏 Acknowledgments

  • Security Community - For sharing JWT vulnerabilities and attack techniques
  • Wallarm - For the comprehensive JWT secrets wordlist
  • PortSwigger - For JWT security research and documentation
  • Open Source Contributors - For cryptographic libraries and tools
  • Penetration Testers Worldwide - For feedback and real-world testing

⭐ Don't forget to star this repository if it helped you! ⭐

Built with ❤️ by security professionals, for security professionals

JWTAuditor - Because your tokens deserve better security