Skip to content

offseckit/jwt

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

>_ osk jwt

Decode and analyze JWT tokens from your terminal. Inspect headers, payloads, check expiration, and detect security issues.

Part of OffSecKit | Browser version | Unified CLI

Install

This tool is part of the OffSecKit CLI toolkit:

pip install offseckit

Usage

# Decode a JWT token
osk jwt decode eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIn0.dozjgNryP4J3jVmNHl0w5N_XgL0n3I9PlFUP0THsR8U

# Decode from clipboard (macOS)
pbpaste | osk jwt decode

# Security analysis — check for weak algorithms, missing claims, expiration issues
osk jwt analyze eyJhbGciOiJub25lIiwidHlwIjoiSldUIn0.eyJzdWIiOiIxMjM0NTY3ODkwIn0.

# Output as JSON for scripting
osk jwt decode --json-output eyJhbGciOiJIUzI1NiIs...

# List all known JWT signing algorithms
osk jwt algorithms

Commands

Command Description
osk jwt decode Decode a JWT and display header, payload, signature, timestamps
osk jwt analyze Run security analysis on a JWT (alg:none, weak keys, missing claims)
osk jwt algorithms List all known JWT signing algorithms with strength ratings

Options

Flag Description
-i, --input JWT token string (alternative to argument)
--json-output Output as JSON for scripting

Related

License

MIT

About

Decode and analyze JWT tokens from your terminal — part of OffSecKit CLI

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors