jwudtool verify --secret mysecret <token> Expected output:
go install github.com/youruser/jwudtool@latest Got a feature request or found a bug? Open an issue on GitHub .
"alg": "HS256", "typ": "JWT"
HEADER:
jwudtool version # Output: jwudtool 0.2.0 | Command | Purpose | |---------|---------| | decode | Decode header + payload without verifying signature | | verify | Check signature using a secret or public key | | forge | Create a new token from an existing one (change claims) | | fuzz | Test token against common attacks | Tutorial: Decode a JWT Given this sample token: jwudtool tutorial
✓ Signature valid If invalid:
Enter — a lightweight, command-line utility designed to simplify JWT inspection, manipulation, and testing. jwudtool verify --pubkey public
jwudtool verify --pubkey public.pem <token> Need to change a claim for testing? Clone and modify:
jwudtool verify --secret mysecret <token> Expected output:
go install github.com/youruser/jwudtool@latest Got a feature request or found a bug? Open an issue on GitHub .
"alg": "HS256", "typ": "JWT"
HEADER:
jwudtool version # Output: jwudtool 0.2.0 | Command | Purpose | |---------|---------| | decode | Decode header + payload without verifying signature | | verify | Check signature using a secret or public key | | forge | Create a new token from an existing one (change claims) | | fuzz | Test token against common attacks | Tutorial: Decode a JWT Given this sample token:
✓ Signature valid If invalid:
Enter — a lightweight, command-line utility designed to simplify JWT inspection, manipulation, and testing.
jwudtool verify --pubkey public.pem <token> Need to change a claim for testing? Clone and modify: