Hacksudo JWT X-Ray wót Hacksudo
JWT inspection, analysis, builder and lightweight request modifier for security testing inside Firefox.
EksperimentelneEksperimentelne
Za Firefox za Android™ k dispozicijiZa Firefox za Android™ k dispoziciji
Metadaty rozšyrjenja
Wó toś tom rozšyrjenju
🛡 Hacksudo JWT X-Ray
JWT Inspection, Analysis, Builder & Lightweight Request Modifier
Built by Vishal Waghmare — hacksudo.com
🔎 OVERVIEW
Hacksudo JWT X-Ray is a Firefox extension designed for security researchers, bug bounty hunters, developers, and cybersecurity students.
It allows you to detect, decode, analyze, edit, and re-encode JWT tokens directly inside your browser.
✨ FEATURES
🔍 Automatic JWT Detection
• Detects JWT in Authorization headers
• Detects JWT in cookies
• Detects JWT in LocalStorage / SessionStorage
• Stores detected tokens in history
🧠 Smart Security Analysis
• Detects alg=none
• Checks missing exp, iat, iss, aud
• Detects expired tokens
• Identifies long-lived tokens
• Highlights sensitive claims (admin, role, scope, permissions)
🧩 Token Builder
• Edit header & payload JSON
• Re-encode unsigned tokens
• Re-sign tokens using:
- HS256
- HS384
- HS512
• Load edited token into decoder
🔄 Token Compare
• Compare two tokens
• Highlight changed claims
• Useful for privilege testing
📜 Rule-Based Request Modifier
• Apply Authorization Bearer token
• Inject cookies
• URL-based rule matching (contains, startsWith, regex)
🗂 Token History
• Stores up to 50 detected tokens
• Shows source, URL, timestamp
• Click to instantly load
⚠️ DISCLAIMER
This tool is intended strictly for:
• Authorized penetration testing
• Security research
• Educational use
Do NOT use against systems without permission.
🌐 Author
Vishal Waghmare
https://hacksudo.com
JWT Inspection, Analysis, Builder & Lightweight Request Modifier
Built by Vishal Waghmare — hacksudo.com
🔎 OVERVIEW
Hacksudo JWT X-Ray is a Firefox extension designed for security researchers, bug bounty hunters, developers, and cybersecurity students.
It allows you to detect, decode, analyze, edit, and re-encode JWT tokens directly inside your browser.
✨ FEATURES
🔍 Automatic JWT Detection
• Detects JWT in Authorization headers
• Detects JWT in cookies
• Detects JWT in LocalStorage / SessionStorage
• Stores detected tokens in history
🧠 Smart Security Analysis
• Detects alg=none
• Checks missing exp, iat, iss, aud
• Detects expired tokens
• Identifies long-lived tokens
• Highlights sensitive claims (admin, role, scope, permissions)
🧩 Token Builder
• Edit header & payload JSON
• Re-encode unsigned tokens
• Re-sign tokens using:
- HS256
- HS384
- HS512
• Load edited token into decoder
🔄 Token Compare
• Compare two tokens
• Highlight changed claims
• Useful for privilege testing
📜 Rule-Based Request Modifier
• Apply Authorization Bearer token
• Inject cookies
• URL-based rule matching (contains, startsWith, regex)
🗂 Token History
• Stores up to 50 detected tokens
• Shows source, URL, timestamp
• Click to instantly load
⚠️ DISCLAIMER
This tool is intended strictly for:
• Authorized penetration testing
• Security research
• Educational use
Do NOT use against systems without permission.
🌐 Author
Vishal Waghmare
https://hacksudo.com
Z 0 wót 0 pógódnośujucych pógódnośony
Pšawa a daty
Trjebne pšawa:
- Pśistup k rejtarikam wobglědowaka měś
- Pśistup k wašym datam za wšykne websedła měś
Gromaźenje datow:
- Wuwijaŕ groni, až toś to rozšyrjenje gromaźenje datow njetrjeba.
Dalšne informacije
- Dodankowe wótzkaze
- Wersija
- 1.1.2
- Wjelikosć
- 20,82 KB
- Slědny raz zaktualizěrowany
- 23 de zile în urmă (16 feb. 2026)
- Pśiswójźbne kategorije
- Pšawidła priwatnosći
- Cytajśo pšawidła priwatnosći za toś ten dodank
- Wersijowa historija
- Zběrce pśidaś