Skip to content

Commit a7cd1d7

Browse files
authored
Update README.md
1 parent 6243fda commit a7cd1d7

File tree

1 file changed

+49
-1
lines changed

1 file changed

+49
-1
lines changed

README.md

Lines changed: 49 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,49 @@
1-
# jwt-hammer
1+
# JWTHammer
2+
3+
A lightweight, CPU-based JWT signature brute force tool written in Go.
4+
5+
## Overview
6+
7+
JWTHammer provides an alternative to GPU-based tools like Hashcat for cracking JWT signatures. It's designed to be simple, efficient, and work on systems without dedicated graphics hardware.
8+
9+
## Features
10+
11+
- Pure CPU implementation - no GPU required
12+
- Multithreaded design for better performance
13+
- Support for HMAC-SHA256 signatures (HS256)
14+
- Simple command-line interface
15+
- Memory-efficient wordlist processing
16+
17+
## Installation
18+
19+
```bash
20+
# Clone the repository
21+
git clone https://github.com/yourusername/jwthammer
22+
cd jwthammer
23+
24+
# Build the binary
25+
go build -o jwthammer
26+
27+
# Or run directly
28+
go run main.go <jwt_token> <wordlist_file>
29+
```
30+
31+
## Usage
32+
33+
```bash
34+
./jwthammer <jwt_token> <wordlist_file>
35+
```
36+
37+
### Example
38+
39+
```bash
40+
./jwthammer "<full-token>" rockyou.txt
41+
```
42+
43+
## Performance
44+
45+
Performance depends on your CPU and the size of your wordlist. JWTHammer automatically uses multiple workers to utilize available CPU cores.
46+
47+
## Disclaimer
48+
49+
This tool is intended for security testing and educational purposes only. Always obtain proper authorization before testing security on any system you don't own.

0 commit comments

Comments
 (0)