JWT token manipulation, IDOR testing, and authentication bypass generators for testing access control.
Create and sign JWT tokens with various algorithms including 'none'.
Generate Insecure Direct Object Reference testing payloads with sequential IDs, UUID tampering, and path traversal.