View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update | 
|---|---|---|---|---|---|
| 0006888 | Kali Linux | Queued Tool Addition | public | 2020-11-28 14:55 | 2021-01-09 14:40 | 
| Reporter | tyki6 | Assigned To | |||
| Priority | normal | Severity | minor | Reproducibility | N/A | 
| Status | acknowledged | Resolution | open | ||
| Summary | 0006888: myjwt - A cli for cracking, testing vulnerabilities on Json Web Token(JWT) | ||||
| Description | [Name] - myjwt [Version] - 1.1.2 [Homepage] - https://myjwt.readthedocs.io/en/latest/?badge=latest [Download] - Pypi: https://pypi.org/project/myjwt/, Git: https://github.com/mBouamama/MyJWT/releases [Author] - mBouamama, https://github.com/mBouamama [Licence] - MIT [Description] - This cli is for pentesters, CTF players, or dev. You can decode jwt, modify your jwt, sign with a new key, rsa/hmac confusion,brute force with dictionnary, crack signature, verify signature, inject sql ,jku bypass, x5u bypass, etc....With this tool you can exploit many miss-configurations of jwt. [Dependencies] - Python3.6, click==7.1.2,requests==2.25.0,cryptography==3.2.1,pyOpenSSL==20.0.0, all dependencies are in requirements.txt, (pyup bot enable for update) [Similar tools] - jwt_tool, jwtcat [Activity] - When did the project start? 01/11/2020, last commit today. [How to install] - How do you compile it? python -m pip install myjwt==1.1.2 [How to use] - myjwt --help for all usages with all options, ex: myjwt eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1c2VyIjpudWxsfQ.Tr0VvdP6rVBGBGuI_luxGCOaz6BbhC6IxRTlKOW8UjM  -p "user=admin" --sign pentesterlab --print [Packaged] - Is the tool already packaged for Debian?No | ||||
| @kali-team, please could this be packaged up. | |
