>I'll give a try using some typical passwords I have been using, but I'm not that optimistic :/
Last I checked, you can test 5-6 password variations / second on a BIP38 wallet using btcrecover (
https://github.com/3rdIteration/btcrecover) on a late model Macbook Pro. You're not going to brute force any serious passwords with that -- but, if you have 5-10 passwords that you've used regularly in the past, you could try a pretty good range of variations of those passwords in a few hours of testing. (Figure 3600 seconds / hour x 5 variations / second = 18,000 variations / hour).
Any reason why you're bumping 2 old BIP38 topics with your own fork instead of the original on Github?