Skip to content

An advanced JWT extraction & decoding tool for bug bounty hunters! πŸ΄β€β˜ οΈ

License

Notifications You must be signed in to change notification settings

Sec-Fork/JWTXposer

Β 
Β 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

10 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

JWTXposer

Automated JWT Discovery & Analysis Tool for Bug Bounty Hunters and Red Teamers

What Is JWTXposer?

image

JWTXposer is an automated reconnaissance tool that scans public archives like the Wayback Machine, extracts leaked JWT tokens, and decodes them to identify potentially exploitable information.

Built specifically for bug bounty hunters, red teamers, and CTF players, JWTXposer eliminates manual JWT hunting and highlights juicy claims like userId, access_token, scope, authType, etc. It performs automated passive recon, live endpoint analysis, and JWT decoding to extract juicy tokens that may lead to:

  • πŸ”“ Broken access control
  • πŸ” Privilege escalation
  • πŸ•΅οΈβ€β™‚οΈ Token replay attacks
  • 🧬 Weak signing key discovery

πŸ” Why JWTXposer Exists

Many applications expose JWTs:

  • In old, archived endpoints (e.g. via Wayback Machine)
  • Inside query parameters or API paths
  • Embedded in URLs, JS files, or redirects

These tokens may still:

  • Be valid for replay
  • Contain sensitive claims (like roles, user IDs, access tokens)
  • Be improperly validated (alg: none, expired tokens accepted)

Features

  • Scrapes Wayback Machine for archived endpoints
  • Extracts JWTs from URLs, query strings, and path parameters
  • Automatically decodes** JWTs (no secret key required)
  • Highlights sensitive JWT claims** (userId, scope, authType, etc.)
  • Checks for live endpoints that are still accessible
  • Uses multi-threading for speed (configurable!)
  • Saves results in structured JSON output
  • Outputs colorized summary table using rich

Demo

Watch JWTXposer in action: JWTXP jwt2

Installation

Clone the repo

git clone https://github.com/yourusername/JWTXposer.git
cd JWTXposer

Install Requirements

pip install -r requirements.txt

Output

Results are saved in:

jwt_results.json

Jwtxposer_Output

Upcoming Features

  • Token replay testing (auto)
  • Burp Suite plugin mode
  • GitHub / Google dorking module
  • JWT fuzzing (role, alg, scope)
  • Anomaly detection on tokens (ML-based)

About

An advanced JWT extraction & decoding tool for bug bounty hunters! πŸ΄β€β˜ οΈ

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%