Vulnerability case: Uses publicly available JSON to check if JWT is properly signed after the Header in JWT is set to point to our JSON and sign the JWT with our private key.
Lab: https://brokencrystals.com
Edit JWT: https://jwt.io
simple JSON Web Key generator: https://mkjwk.org