How to use JWT & OAuth Security Toolkit
Use the sign tab to generate a signed JWT using HS256, RS256, or ES256 with your chosen payload and key. Use the verify tab to validate a token signature, or use the PKCE tab to generate a code verifier and challenge pair for OAuth 2.0 flows.
Common use cases
Security engineers use this to prototype and test custom JWT signing and verification flows. OAuth developers use it to generate valid PKCE pairs for authorisation code flows during local testing, and QA teams use it to reproduce token-related authentication bugs.
Why run this in your browser?
All processing happens locally in your browser. Your data never leaves your machine, making it safe for sensitive payloads, internal API responses, and confidential configurations.