View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0006888 | Kali Linux | Queued Tool Addition | public | 2020-11-28 14:55 | 2021-01-09 14:40 |
Reporter | tyki6 | Assigned To | |||
Priority | normal | Severity | minor | Reproducibility | N/A |
Status | acknowledged | Resolution | open | ||
Summary | 0006888: myjwt - A cli for cracking, testing vulnerabilities on Json Web Token(JWT) | ||||
Description | [Name] - myjwt [Version] - 1.1.2 [Homepage] - https://myjwt.readthedocs.io/en/latest/?badge=latest [Download] - Pypi: https://pypi.org/project/myjwt/, Git: https://github.com/mBouamama/MyJWT/releases [Author] - mBouamama, https://github.com/mBouamama [Licence] - MIT [Description] - This cli is for pentesters, CTF players, or dev. You can decode jwt, modify your jwt, sign with a new key, rsa/hmac confusion,brute force with dictionnary, crack signature, verify signature, inject sql ,jku bypass, x5u bypass, etc....With this tool you can exploit many miss-configurations of jwt. [Dependencies] - Python3.6, click==7.1.2,requests==2.25.0,cryptography==3.2.1,pyOpenSSL==20.0.0, all dependencies are in requirements.txt, (pyup bot enable for update) [Similar tools] - jwt_tool, jwtcat [Activity] - When did the project start? 01/11/2020, last commit today. [How to install] - How do you compile it? python -m pip install myjwt==1.1.2 [How to use] - myjwt --help for all usages with all options, ex: myjwt eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1c2VyIjpudWxsfQ.Tr0VvdP6rVBGBGuI_luxGCOaz6BbhC6IxRTlKOW8UjM -p "user=admin" --sign pentesterlab --print [Packaged] - Is the tool already packaged for Debian?No | ||||
@kali-team, please could this be packaged up. |
|