JWT Hunter A simple tool to exploit JWT vulnerabilities. Implemented attacks: None algorithm attack KID Header injection Algorithm confusion If you need to perform another attack, you can use the "custom" function to modify the fields you want and choose your own signing key. Preview