Used to perform a threaded dictionary attack against the secret keyword of HS256 signed tokens usage: JWTCrack.py [-h] [-a {HS256,HS384,HS512}] [-t THREADS] encoded_jwt wordlist ===== JWTCrack (c)2018 ...
This is a simple application where you can login as a user with normal privileges (so normal that you can't do anything!) and by hacking the session id (which is a simple JWT) you should try to ...