Best of JWTSeptember 2022

  1. 1
    Article
    Avatar of systemweaknessSystem Weakness·4y

    Hacking JWT

    Hacking JWT is most commonly used to identify an authenticated user. In most cases it is used as a “session token’s used in APIs but is used for all types of web apps. We will use a very good tool created to exploit many JWT attacks, I recommend it is very good. To exploit this vulnerability we are going to use a web platform lab called PortSwigger.

  2. 2
    Article
    Avatar of devtoDEV·4y

    How to protect a route with JWT Token in React using Context API and React Cookies

    The routes will only be accessible when users have the token saved in cookies or local storage. We’ll learn how to protect a route by JWT authentication in react-router-dom v6.

  3. 3
    Article
    Avatar of glcGolang News·4y

    A Golang Tutorial about a standard project structure with gRPC, SQL, and Dependency Injection

    A Golang Tutorial about a standard project structure with gRPC, SQL, and Dependency Injection. We are going to create a basic login gR PC API, and when you finish, you will know how Standard g RPC API features are implemented in Golang.