Tiny Online Tools logoTiny Online Toolssearchابحث في الادوات…grid_viewكل الادوات
الرئيسيةchevron_rightادوات المطورينchevron_rightمولد ومفكك JWTمولد ومفكك JWT

مولد ومفكك JWT

أنشئ ووقّع JSON Web Tokens باستخدام HMAC أو فكّك أي JWT.

keyإنشاءlock_openDecode
warningSignature is غير متحقق منه here — this tool only decodes the header and payload for inspection purposes.

ادوات مشابهة

مولد نطاق IP

مولد نطاق IP

أنشئ جميع عناوين IP داخل كتلة CIDR أو نطاق IP مخصص.

محقق توقيع JWT

محقق توقيع JWT

تحقق من تواقيع JWT المعتمدة على HMAC محليا داخل المتصفح.

مولد PBKDF2

مولد PBKDF2

اشتق مفاتيح تشفير من كلمات المرور باستخدام PBKDF2 داخل متصفحك.

Regex مولّد

Regex مولّد

Browse a library of common Regex patterns مع token explanations.

محوّل الأحرف الصغيرة

محوّل الأحرف الصغيرة

تحويل النص إلى أحرف صغيرة فوراً.

محرر مسار SVG

محرر مسار SVG

حرّر واعرض بيانات مسار SVG التفاعلية (السمة d).

تحويل JPG إلى AVIF

تحويل JPG إلى AVIF

اضغط صور JPG إلى صيغة AVIF الحديثة للحصول على أحجام أصغر بكثير.

apps

المزيد من الادوات

تصفح مجموعتنا الكاملة من الادوات المجانية عبر الانترنت.

إنشاء & فك التشفير JWTs for Authentication Testing

JSON Web Tokens (JWTs) are the standard for API authentication and authorization. Whether you're building an auth system, testing token flows, or debugging authentication issues, you need a way to quickly إنشاء and inspect JWTs without writing code.

This JWT Generator lets you إنشاء tokens with custom headers and payloads, sign them with HMAC secrets, and instantly inspect any JWT by decoding it. Test your authentication before deploying, verify token structure without extra tools, and debug token-related issues faster.

إنشاء Custom JWTs

Define your token in three parts:

Header: Standard JWT header fields identifying the token type and hashing algorithm. Edit the JSON to customize if needed, though defaults work for most cases.

Payload: The actual token data—user ID, claims, roles, expiration time, etc. Define whatever claims your application expects. The tool accepts any valid JSON.

Secret Key: The HMAC secret used to sign the token. This is crucial: use the same secret when validating tokens in your application. The tool never sends this anywhere—it stays in your المتصفح.

Click إنشاء, and you instantly get a valid, signed JWT ready to use in testing.

Three HMAC Algorithms Supported

HS256 (HMAC-SHA-256): The most common choice. Balances security and performance.

HS384 (HMAC-SHA-384): Stronger hashing for higher security requirements.

HS512 (HMAC-SHA-512): Maximum security with SHA-512 hashing.

Choose based on your application's security needs.

فك التشفير Any JWT

Have a JWT from an API response or log? Paste it in the فك التشفير section and instantly see the فك التشفيرd header and payload. This is invaluable for:

  • Inspecting API Responses: Extract the JWT from an authentication response and see what claims it contains
  • Debugging Auth Issues: Check if a token has the expected user ID, roles, expiration time, etc.
  • Verifying Token Structure: Ensure your auth server is issuing tokens with the correct تنسيق
  • Token Analysis: See at a glance what data a token carries

Note: Decoding doesn't verify the signature—it just extracts and displays the data. This is safe for inspection but doesn't prove the token is valid.

Color-Coded Token Display

When you إنشاء a JWT, it's displayed with color coding showing the three segments:

  • Header segment in one color
  • Payload segment in another
  • Signature segment in a third

This makes it easy to spot which part is which and understand the token structure.

Common Testing Scenarios

Auth Flow Testing: إنشاء tokens with different payloads and test how your application handles them. إنشاء tokens with various expiration times, roles, or user IDs without needing a full auth server.

Bearer Token Validation: إنشاء a token, copy it, add it as a Bearer token to API requests, and verify your authorization middleware accepts it.

Token Claims Verification: Test that your application correctly extracts and uses claims from tokens by generating tokens with specific claim values and checking if your app processes them correctly.

Security Testing: إنشاء tokens with expired timestamps or invalid signatures (by using different secrets) to test how your app handles invalid tokens.

100% المتصفح-Based, Completely Secure

All JWT generation and decoding happens in your المتصفح using the native Web Crypto API. Your secrets never leave your machine, and your إنشاءd tokens aren't sent anywhere. This is safe for testing with production secret values—they never touch an external server.

Copy & Use Immediately

إنشاءd JWTs copy with one click. Paste directly into API request headers or tool test fields without additional تنسيقting.