A powerful Chrome extension for security testing and manipulating JWT (JSON Web Tokens) in web applications. This tool enables security professionals and developers to test different attack vectors by modifying JWT tokens on the fly during security assessments and penetration testing.
- Real-time JWT token manipulation and testing
- On-the-fly token payload modification
- Common JWT attack vector testing
- Token signature validation bypass testing
- Token expiration manipulation
- Algorithm switching capabilities
- DevTools integration for advanced token analysis
- Cookie and localStorage token interception
- Clipboard support for easy token manipulation
- Test privilege escalation by modifying user roles and permissions
- Manipulate token claims to test authorization boundaries
- Bypass signature verification
- Test token expiration handling
- Modify algorithm headers (e.g., 'none' algorithm attacks)
- Inject custom claims for security testing
- Test token replay protection mechanisms
- Clone this repository or download the source code
- Open Chrome and navigate to
chrome://extensions/
- Enable "Developer mode" in the top right corner
- Click "Load unpacked" and select the extension directory
- Click the extension icon in your Chrome toolbar to access the popup interface
- Open Chrome DevTools and find the JWT panel for advanced features
- The extension will automatically detect and parse JWT tokens in Cookies
├── manifest.json # Extension configuration
├── devtools.html # DevTools panel entry
├── panel.html # Main DevTools panel UI
├── images/ # Extension icons
├── css/ # Stylesheets
└── js/ # JavaScript files
To modify or enhance the extension:
- Make your changes to the source code
- Reload the extension in
chrome://extensions/
- Test your changes
This extension is designed for development and testing purposes only. Be cautious when using it with sensitive JWT tokens in production environments.
This project is open source and available under the MIT License.
Contributions are welcome! Please feel free to submit a Pull Request.