Commands

JWT-HACK provides a comprehensive set of commands for JWT security testing and analysis. Each command is designed for specific tasks in the JWT testing workflow.

Available Commands

  • decode - Decode and analyze JWT/JWE tokens
  • encode - Create JWT tokens with custom payloads
  • verify - Verify JWT signatures and expiration
  • crack - Crack JWT secrets using dictionary or brute force
  • payload - Generate attack payloads for security testing
  • scan - Scan for JWT vulnerabilities
  • server - Run JWT-HACK as an API server
  • mcp - Model Context Protocol server mode

Command Structure

All commands follow a consistent structure:

jwt-hack <command> [OPTIONS] <ARGUMENTS>

Get help for any command:

jwt-hack <command> --help