JWTs are widely used to help with authorization. They are quite safe, if the implementation is correct. JWTs are also interesting because sometimes they can hold useful information for extending our attack surface.
Commands
hashcat -a 0 -m 16500 <JWT> /usr/share/wordlists/rockyou.txt