Paste a JWT and click Analyze to decode it.
Paste a JWT and click Analyze to scan for vulnerabilities.
alg:none bypass. The signature is removed. Vulnerable servers accept this as valid without any secret.HMAC JWTs (HS256/384/512) are only as secure as their secret. Many apps ship with:
secret, jwt_secret)password, 123456)
If the secret is found, an attacker can forge any claims — including admin:true or arbitrary user IDs.
For large wordlists, use:
hashcat -a 0 -m 16500 <jwt> wordlist.txt