welcome.
The hashcat documentation is here: https://hashcat.net/wiki/ and/or https://hashcat.net/faq/
1. you can use 1password2john.py (https://raw.githubusercontent.com/magnum...rd2john.py) to extract the hash from you agile keychain file to a file (let's call it output_from_1password2john.txt)
2. you can extract the data from your excel tabel to a wordlist (1 password per line, make sure there is no extra whitespace/spaces): let's call it output_from_excel.txt
3. run hashcat with: hashcat -m 6600 -a 0 -w 3 output_from_1password2john.txt output_from_excel.txt
If you are sure that the excel table contains the password, it should crack
good luck
The hashcat documentation is here: https://hashcat.net/wiki/ and/or https://hashcat.net/faq/
1. you can use 1password2john.py (https://raw.githubusercontent.com/magnum...rd2john.py) to extract the hash from you agile keychain file to a file (let's call it output_from_1password2john.txt)
2. you can extract the data from your excel tabel to a wordlist (1 password per line, make sure there is no extra whitespace/spaces): let's call it output_from_excel.txt
3. run hashcat with: hashcat -m 6600 -a 0 -w 3 output_from_1password2john.txt output_from_excel.txt
If you are sure that the excel table contains the password, it should crack
good luck