jwt-cracker icon indicating copy to clipboard operation
jwt-cracker copied to clipboard

Simple HS256, HS384 & HS512 JWT token brute force cracker.

Results 10 jwt-cracker issues
Sort by recently updated
recently updated
newest added

I want to crack JWT with HS256 What is the different between your project and hashcat with mode 16500 ? Thank you

I don't know why it doesn't work. ``` jwt-cracker "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiJma2ZmIiwiZW1haWwiOiJjZGNkQGRzZnMuY29tIiwibmFtZSI6ImZsZGZrZHNrZmQiLCJpY XQiOjE1OTI4MDE5MTZ9.Cvzj0tVtVGc60xvqLdyasYf6gF8QLi8HQCKlxw9nBk4" 4 SECRET NOT FOUND Time taken (sec): 0.01 Attempts: 12 ```

Did you consider merging back the changes from this fork? Seems considerably faster... https://github.com/vaverix/multithread-jwt-cracker

Dear Sir, It is possible to making JWT Token from lost password ZIP, RAR & Wallet.dat file. Please advice...

I think it would be totally cool the cracker would benefit from GPU. For example: http://gpu.rocks/

Is it possible to brute-force based on a predefined password file ?

enhancement
help wanted

Running: ``` sudo jwt-cracker eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJmbGFnIjoiQlRMe180X0V5ZXN9IiwiaWF0Ijo5MDAwMDAwMCwibmFtZSI6IkdyZWF0RXhwIiwiYWRtaW4iOnRydWV9.jbkZHll_W17BOALT95JQ17glHBj9nY-oWhT1uiahtv8 6 ``` Getting: ``` file:///usr/local/lib/node_modules/jwt-cracker/index.js:7 const pkg = JSON.parse(await readFile(new URL('./package.json', import.meta.url))) ^^^^^ SyntaxError: Unexpected reserved word ```

Given the way that variationsStream is implemented, the code still calculates all permutations with repetition up to the min length, but these are no longer passed along to be processed...