A comprehensive desktop application for JWT token analysis, security testing, and penetration testing. Built with Electron for cross-platform compatibility and designed for security professionals and developers.
- JWT Decoder - Decode and analyze JWT tokens to view structure, claims, and metadata
- JWT Encoder - Create custom JWT tokens with configurable headers, payloads, and signatures
- Token Validator - Verify JWT signatures and validate claims against provided secrets/keys
- Key Generator - Generate cryptographically secure HMAC secrets and RSA key pairs
- Comprehensive Scanner - Automated vulnerability detection with security scoring
- 20+ Attack Vectors - Generate attack payloads for JWT vulnerabilities including 2024-2025 CVEs
- Brute Force Testing - Dictionary-based attacks against weak HMAC secrets
- Modern Vulnerability Detection - Including JWK injection, algorithm confusion, and latest CVEs
- Network Proxy - Intercept HTTP/HTTPS traffic to capture JWT tokens from live requests
- HTTPS Interception - Full SSL/TLS decryption with CA certificate support
- Replay Attack Simulator - Test tokens for replay vulnerabilities
- Token Comparison - Compare JWT tokens side-by-side to identify differences
- HTTP Request Tester - Test JWT tokens in real HTTP requests with custom headers
- Base64 Encoder/Decoder - Essential utility for JWT component manipulation
- Claims Analysis - Detailed breakdown of standard and custom JWT claims
- Algorithm Support - Full support for HMAC, RSA, and none algorithms
- Multi-Language Support - Available in English and German
- Modern Interface - Clean, intuitive design with dark theme
- Auto-Updates - Automatic update checking and installation
- Comprehensive Help - Built-in documentation and usage guides
- Cross-Platform - Windows, macOS, and Linux support
- HS256 - HMAC using SHA-256
- HS384 - HMAC using SHA-384
- HS512 - HMAC using SHA-512
- RS256 - RSA using SHA-256
- RS384 - RSA using SHA-384
- RS512 - RSA using SHA-512
- none - No signature verification (dangerous but testable)
- Algorithm None Attack - Bypass signature verification by setting algorithm to "none"
- JWK Injection - Inject malicious JSON Web Keys in token headers
- Kid Parameter Injection - Path traversal and command injection via "kid" parameter
- Algorithm Confusion - Change RS256 to HS256 using public key as HMAC secret
- JKU URL Hijacking - Point JKU to attacker-controlled JWK sets
- X5U Certificate Exploit - Exploit X.509 certificate URL parameters
- JWT Smuggling - Exploit parsing differences between JWT libraries
- JWKS Cache Poisoning - Poison JWKS cache with malicious keys
- Weak Secret Detection - Test against common passwords and weak secrets
- Nested JWT Attack - JWT-in-JWT confusion and privilege escalation
- Audience Confusion - Multi-audience token reuse across services
- Parameter Pollution - Duplicate parameters with conflicting values
- JWT Sidejacking - Session hijacking specific to JWT implementations
- Token Replay - Remove time-based claims for token reuse
- Timing Attack - Exploit timing differences in signature verification
- CVE-2024-54150 - Psychic signature attack for ECDSA algorithms
- CVE-2024-34273 - Prototype pollution in nJwt library
- CVE-2025-20188 - Hard-coded JWT secret exploitation (CVSS 10.0)
- CVE-2025-30144 - Issuer claim validation bypass in fast-jwt
- Post-Quantum Prep - Assess quantum computing vulnerability and migration readiness
- Live Traffic Capture - Intercept JWT tokens from network requests
- SSL/TLS Decryption - Full HTTPS traffic inspection with MITM capabilities
- CA Certificate Export - Export and install trusted root certificate
- Real-Time Token Detection - Automatic JWT extraction from headers, cookies, and bodies
- Enable HTTPS Interception - Check the option in proxy settings
- Export CA Certificate - Click "Export CA Certificate" button
- Install Certificate - Add to browser's trusted certificate store
- Configure Browser - Set proxy to 127.0.0.1:8080 (default port)
- Start Capturing - All JWT tokens will be automatically captured
- Automated Replay - Send multiple requests with captured tokens
- Configurable Parameters - Adjust delay, request count, and HTTP method
- Result Analysis - Monitor response codes and timing
- Vulnerability Detection - Identify tokens vulnerable to replay attacks
- Side-by-Side Analysis - Compare two JWT tokens visually
- Difference Highlighting - Identify changes in headers, claims, and signatures
- Structural Comparison - Detect algorithm changes and claim modifications
- Security Impact - Understand how token changes affect security
- Decode Tokens - Paste any JWT in the Decoder tab to see its structure
- Analyze Security - Use Security Analysis to identify vulnerabilities
- Generate Attacks - Create attack payloads in the Attack Vectors tab
- Validate Tokens - Verify signatures using the Token Validator
- Start Proxy - Enable proxy with optional HTTPS interception
- Configure Browser - Point browser proxy settings to localhost:8080
- Browse Target Site - Navigate to pages using JWT authentication
- Capture Tokens - View all captured JWT tokens in real-time
- Analyze & Test - Use captured tokens for security analysis
- Gather JWT Tokens - Use proxy or paste from target application
- Run Security Scan - Comprehensive vulnerability analysis with scoring
- Generate Attack Payloads - Create targeted exploits based on findings
- Test with HTTP Tester - Validate attacks against live endpoints
- Simulate Replay Attacks - Test token replay vulnerabilities
- Algorithm Security - Weak or dangerous algorithms
- Claims Validation - Missing or insecure claims
- Signature Analysis - Signature strength and entropy
- Token Structure - Malformed or oversized tokens
- Modern Attacks - JWK injection, kid exploitation, etc.
- Best Practices - RFC compliance and security standards
- 100-Point Scale - Comprehensive security assessment
- Severity Classification - Critical, High, Medium, Low rankings
- Detailed Recommendations - Specific remediation guidance
- Impact Analysis - Real-world attack scenarios
- Download - Get the latest release for your platform
- Install - Run the installer (Windows) or mount DMG (macOS)
- Launch - Start JWT Security Analyzer
- Auto-Update - App will check for updates automatically
- Export CA Certificate - From proxy settings
- Install in Browser - Add to trusted certificate authorities
- Configure Proxy - Set browser proxy to 127.0.0.1:8080
- Enable HTTPS Interception - Check the option before starting proxy
- Always ensure you have proper authorization before testing any system
- Users are responsible for complying with applicable laws and regulations
- Only test systems you own or have explicit permission to test
- Use responsibly and ethically in accordance with your organization's policies
- Framework - Electron for cross-platform desktop apps
- JWT Processing - jsonwebtoken library with comprehensive algorithm support
- Cryptography - Node.js crypto module and node-forge for RSA/certificate operations
- Proxy Engine - HTTP-proxy with custom SSL/TLS interception
- UI Technology - Modern HTML5, CSS3, and JavaScript
- Supported Platforms - Windows 10+, macOS 10.14+, Linux (Ubuntu 18.04+)
26/08/2025 - 1.2.0 - Enhanced Attack Vectors and CVE Integration
- Added CVE-2024-54150 psychic signature attack implementation
- Added CVE-2024-34273 prototype pollution attack vector
- Added 2025 CVE implementations: CVE-2025-20188, CVE-2025-30144, CVE-2025-4692
- Implemented complete attack generation functions for all vectors
- Enhanced X5U certificate exploit capabilities
- Improved nested JWT attack detection
- Added comprehensive timing attack patterns
- Enhanced JWKS poisoning attack accuracy
- Expanded parameter pollution attack coverage
- Added JWT sidejacking attack implementation
- Updated weak secret brute force attack patterns
- Added post-quantum cryptography vulnerability assessment
- Verified all implementations against 2025 security standards (RFC 8725, OWASP latest)
- Updated attack vector count from 16+ to 20+
02/08/2025 - 1.1.0 - Added Network Proxy with HTTP/HTTPS interception
- Implemented SSL/TLS decryption with CA certificate generation
- Added JWT token capture from live network traffic
- Introduced Replay Attack Simulator
- Added Token Comparison tool for side-by-side analysis
- Improved navigation with collapsible sections
- Enhanced security analysis with network attack vectors
- Updated help documentation with new features
- Fixed various UI/UX improvements
25/07/2025 - 1.0.0 - Initial Release
- Complete JWT security testing suite
- 16+ attack vector generators
- Multi-language support (English/German)
- Comprehensive security analysis engine
- Modern responsive interface
- Auto-updater functionality
- Built-in help documentation
- API Security Testing - Test JWT implementations before deployment
- Token Debugging - Decode and analyze problematic tokens
- Key Management - Generate secure keys for development
- Security Education - Learn JWT vulnerabilities hands-on
- Live Traffic Analysis - Capture and analyze JWT tokens from applications
- Vulnerability Research - Explore new JWT attack vectors
- Replay Testing - Identify replay-vulnerable implementations
- Security Audits - Comprehensive JWT security assessments
- Network Interception - MITM proxy for JWT token extraction
- Attack Generation - Create exploit payloads for discovered vulnerabilities
- Token Manipulation - Modify and test token variations
- Automated Testing - Bulk security analysis of captured tokens
Developed by www.bavamont.com
Built for: Security professionals, penetration testers, and developers
Powered by:
- Electron framework
- jsonwebtoken library
- Node.js cryptography
- node-forge for certificate operations
- http-proxy for network interception