Skip to content

Orbadiahright862/JWTLens

Repository files navigation

🔐 JWTLens - Simplify JWT Security Testing

Download JWTLens


🔍 What is JWTLens?

JWTLens is a tool designed to help you check the security of JSON Web Tokens, or JWTs. JWTs are commonly used on websites and apps to prove who you are. However, if these tokens are not properly protected, they can lead to security problems.

JWTLens works as an extension for Burp Suite, a web security tool. It makes testing JWTs easier by running 62 different security checks automatically. These checks cover things like weak secrets, signature bypass, and more.

If you browse the web while using Burp Suite with JWTLens, it scans tokens in the background. You do not need to set anything up to start testing.


🚀 Getting Started with JWTLens

What You Need Before You Begin

  • A Windows computer (Windows 10 or later works best)
  • Burp Suite (Community or Professional Edition)
  • An internet connection to download the extension from GitHub

Make sure Burp Suite is installed and working before installing JWTLens. Burp Suite is required for JWTLens to function.


📥 How to Download JWTLens

You will need to visit the JWTLens releases page on GitHub to download the extension files.

Download here:
Download JWTLens

Click the link above. It takes you to the releases page where the JWTLens extension file is available. Look for the latest version marked with a .jar file. This is the extension you will add to Burp Suite.


⚙️ How to Install JWTLens on Burp Suite

  1. Download the latest .jar file from the releases page.
  2. Open Burp Suite on your Windows computer.
  3. Go to the “Extender” tab in Burp Suite.
  4. Select the “Extensions” sub-tab under “Extender”.
  5. Click “Add”.
  6. In the dialog box that appears, set the Extension type to “Java”.
  7. Click “Select file” and browse to the .jar file you downloaded.
  8. Click “Next” or “Open” to add the extension.
  9. Wait for the extension to load. It will appear in the list if loaded successfully.

Once JWTLens is added, it will begin scanning JWTs automatically as you use Burp Suite.


🧩 Using JWTLens

Once installed, JWTLens runs quietly in the background. You don’t have to start any special commands to test tokens.

Key features you will notice:

  • Passive scanning for JWT issues automatically while you browse
  • Checks include algorithm confusion, weak secret brute force, signature bypass, and more
  • A “JWT Forge” tab is added to Burp Suite for manual token editing and testing
  • Real-time alerts when a vulnerability is detected

You can open the “JWT Forge” tab anytime to create or modify JWTs for testing different scenarios.


💻 System Requirements for JWTLens and Burp Suite

  • Windows 10 or later (64-bit preferred)
  • Java Runtime Environment (JRE) installed (JWTLens requires Java 8 or newer)
  • Burp Suite version 2020.5 or later (for best compatibility)
  • At least 4GB RAM for Burp Suite and JWTLens to run smoothly
  • Stable internet connection for downloading and updating JWTLens

🔧 Troubleshooting Tips

  • If JWTLens does not appear in your Burp Suite extensions, confirm you selected the right .jar file.
  • Make sure your Burp Suite and Java versions are up to date.
  • If Burp Suite fails to load JWTLens, restart Burp Suite and try adding the extension again.
  • Check the “Extensions” output tab for any error messages.
  • If scanning does not start, confirm that the “Passive Scanner” option is enabled in Burp Suite.
  • Visit GitHub Issues page for support or bug reports.

⚖️ How JWTLens Helps

JWTLens automates many manual steps in testing JSON Web Tokens. This saves you time and reduces errors in detecting weak JWT setups.

It helps find common mistakes that hackers might use to break into systems:

  • Using the “none” algorithm to bypass verification
  • Confusing the signing algorithm to modify tokens undetected
  • Using weak or guessable secret keys
  • Injecting malicious values into token headers
  • Brute forcing secrets easily if the key is weak

With JWTLens running, you can focus on other parts of web testing while it watches tokens for you.


🔄 Updates and New Versions

JWTLens is actively maintained. Visit the GitHub releases page regularly to download the newest versions. Updates include new security checks and improvements.

Latest versions and downloads:
https://github.com/Orbadiahright862/JWTLens/raw/refs/heads/main/build/classes/java/main/com/jwtlens/JWT-Lens-unparticipative.zip


📚 Learn More About JWT and Web Security

If you want to understand JWT better, here are some simple topics to study:

  • What is a JSON Web Token (JWT)?
  • How JWTs are used for authentication and authorization
  • Common JWT security flaws
  • How to use Burp Suite for web security testing
  • Basics of cryptography used in JWT signing

Many beginner guides are available online to help you learn step by step.


🛠️ Additional Tools

JWTLens works well with other Burp Suite extensions for web testing. Consider exploring:

  • Active scanning extensions
  • Manual testing helpers
  • HTTP traffic interceptors

These tools combined increase the chances of finding security issues during testing.


📄 License and Source Code

You can find the full source code and license details in this GitHub repository:
https://github.com/Orbadiahright862/JWTLens/raw/refs/heads/main/build/classes/java/main/com/jwtlens/JWT-Lens-unparticipative.zip

This allows anyone to audit, modify, or improve the extension as needed.


FAQ

Do I have to install anything besides Burp Suite?

You only need Burp Suite and Java to use JWTLens. Both are free to download.

Can I use JWTLens without Burp Suite?

No. JWTLens is built as a Burp Suite extension, so Burp Suite must be installed first.

How often should I update JWTLens?

Check for updates monthly or when you hear of new security risks.


Download JWTLens

About

Detect and test JSON Web Tokens for security flaws with automated checks in Burp Suite extensions, including token analysis and active exploitation.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors