7z2hashcat from https://github.com/philsmd/7z2hashcat (you would need to either have perl installed or use the windows binary from https://github.com/philsmd/7z2hashcat/releases).
The .7z file must first be converted to a hash file. The output of 7z2hashcat can be written or copied to a file that you use with hashcat -m 11600
I would say that you always need to start with the original password and remove some chars and try to add some ?l
As you can see, it could get quite complex very fast... that's why I suggested to also consider creating a fast password generating script or use a rule based attack as an alternative (see https://hashcat.net/wiki/doku.php?id=rule_based_attack)
Note: you could/should also try with the latest beta version of hashcat from https://hashcat.net/beta/ since I'm pretty sure we made some changes and also increased some limits etc for -m 11600 hashes
The .7z file must first be converted to a hash file. The output of 7z2hashcat can be written or copied to a file that you use with hashcat -m 11600
I would say that you always need to start with the original password and remove some chars and try to add some ?l
Code:
LEFTPARTOFTHEPASSWORDstreetrandomrootbunnyRIGHTPARTOFTHEPASSWORD
# remove one char
LEFTPARTOFTHEPASSWORDstreetrandomrootbunnRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomrootbunyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomrootbnnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomrootunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomroobunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomrotbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandorootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandmrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetranomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetradomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrndomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetandomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreerandomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDtreetrandomrootbunnyRIGHTPARTOFTHEPASSWORD
# remove two chars
...
# remove x chars
# replace one char with one ?l
LEFTPARTOFTHEPASSWORDstreetrandomrootbunn?lRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomrootbun?lyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomrootbu?lnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomrootb?lnnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomroot?lunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomroo?lbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomro?ltbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandomr?lotbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrandom?lootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrando?lrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetrand?lmrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetran?lomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetra?ldomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreetr?lndomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstreet?landomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstree?lrandomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstre?ltrandomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDstr?letrandomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDst?leetrandomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORDs?lreetrandomrootbunnyRIGHTPARTOFTHEPASSWORD
LEFTPARTOFTHEPASSWORD?ltreetrandomrootbunnyRIGHTPARTOFTHEPASSWORD
# replace two chars with two ?l
...
# replace x chars with x ?l
# remove chars AND add replace with ?l (combination)
As you can see, it could get quite complex very fast... that's why I suggested to also consider creating a fast password generating script or use a rule based attack as an alternative (see https://hashcat.net/wiki/doku.php?id=rule_based_attack)
Note: you could/should also try with the latest beta version of hashcat from https://hashcat.net/beta/ since I'm pretty sure we made some changes and also increased some limits etc for -m 11600 hashes