MyJWT: crack Your jwt

https://github.com/mBouamama/MyJWT/workflows/Unit%20Test/badge.svg https://img.shields.io/pypi/v/myjwt https://img.shields.io/pypi/pyversions/myjwt.svg https://repology.org/badge/version-for-repo/blackarch/myjwt.svg https://pepy.tech/badge/myjwt https://inventory.raw.pm/img/badges/Rawsec-inventoried-FF5050_flat.svg https://pyup.io/repos/github/mBouamama/MyJWT/shield.svg https://img.shields.io/pypi/l/myjwt.svg https://codecov.io/gh/mBouamama/MyJWT/branch/master/graph/badge.svg?token=V7yZJ1bZV9 https://img.shields.io/badge/code%20style-black-000000.svg _images/docstr_coverage_badge.svg https://codebeat.co/badges/1599eda5-d82b-41a1-93a1-dc8c51afc33f

This cli is for pentesters, CTF players, or dev. You can modify your jwt, sign, inject ,etc… Check [Documentation](http://myjwt.readthedocs.io) for more information. If you see problems or enhancement send an issue.I will respond as soon as possible. Enjoy :)

Getting help

If the Documentation doesn’t answer your question, you can discuss rawsec-cli or get help using it on myjwt’s repository discussion. Bug reports are gladly accepted at the GitHub issue tracker. GitHub also hosts the code repository.

More information