JWTLens automatically detects and exploits JWT vulnerabilities as you browse. 62 security checks — passive scanning, algorithm confusion, KID injection, weak secrets, JWT Forge editor, and secret extraction. Built for real penetration testing.
No other Burp extension covers the full JWT attack surface. JWTLens runs automatically in the background and gives you a complete toolkit when you want to go deeper.
23 passive checks run on every request and response flowing through Burp Proxy. No configuration required — JWT misconfigurations are flagged the instant they appear in your traffic.
One right-click triggers all known JWT attack vectors: algorithm none (16 permutations), algorithm confusion with real JWKS parsing, KID injection, header injection, claim tampering, and CVE-2022-21449.
A live jwt.io-style editor built into Burp. Paste any JWT, edit headers and claims, re-sign with any algorithm, and export as a ready-to-use cURL or Python script. Discovered secrets auto-load.
Automatically scans every JS, JSON, HTML, and text response for hardcoded JWT secrets, RSA/EC private keys, inline JWKS, and Base64-encoded secrets. Feeds directly into active attacks.
The RS256 to HS256 attack fetches the server's actual public key from JWKS endpoints, follows OIDC discovery, and uses keys found by the secret extractor — so it actually works on real targets.
Color-coded severity table (High, Medium, Low, Info) with full advisory panel, decoded JWT view, smart deduplication per host, and one-click CSV export for reporting.
Offline HMAC verification against 200+ built-in secrets plus any secrets discovered by the extractor during your session. Custom wordlist upload supported — all from the Burp UI.
All actions search both the HTTP request and response for JWTs. When multiple tokens are found, a picker dialog lets you choose. Each JWT is labeled with its source location.
Real screenshots from live testing sessions against PortSwigger JWT labs and intentionally vulnerable applications.
Just browse with Burp running. JWTLens automatically intercepts every request and response, detecting JWT tokens and analyzing them in real time. The Burp Issues tab fills up with color-coded findings before you even run an active scan.
The JWTLens tab gives you a dedicated security dashboard inside Burp Suite. All JWT findings in one place, sortable by severity, with full advisory details and remediation guidance for every issue.
Right-click any request in Proxy, Repeater, Intruder, or Logger to access the full JWTLens attack menu. Run passive checks, fire all active attacks, or send the token straight to the Forge tab for manual editing.
JWT Forge is a full jwt.io-style editor built directly into Burp Suite. When brute force cracks a secret, the token and secret are automatically loaded into Forge so you can immediately re-sign with elevated privileges.
The most complete JWT check coverage of any Burp extension. Every known JWT attack vector, misconfiguration, and CVE.
Every other Burp JWT extension covers a fraction of the attack surface. JWTLens was built to fix that.
JWTLens requires Java 17+ and Burp Suite Professional or Community Edition 2024.1+.
Clone the repo and build the JAR with Gradle. No dependencies to install beyond Java.
Go to Extensions → Installed → Add. Set Extension Type to Java.
Select build/libs/jwtlens-1.0.0.jar and click Next. Two new tabs appear immediately.
JWTLens is fully active. Browse any target app and findings appear automatically.
# Clone the repository git clone https://github.com/chawdamrunal/JWTLens.git cd JWTLens/jwtlens-burp # Build the JAR (requires Java 17+) ./gradlew clean jar # JAR is now at: build/libs/jwtlens-1.0.0.jar # Load in Burp Suite: Extensions → Installed → Add → Java → Select JAR → Next
JWTLens is free, open-source, and works with Burp Suite Community Edition. Start finding JWT vulnerabilities in minutes.