Thank you all for your help.
I wasn't able to use the extract script, but using the dev tools I was able to extract two payloads that look like
{"pbkdf2_iterations":5000,"version":3,"payload":"jshhfjsagfhsjdgfasukdfgsuafgudfgsauyfguhfusag"}
I saved both as .txt files and now I'll start reading about bruteforcing my old passwords.
I've noticed btcrecover (
https://github.com/gurnec/btcrecover) hasn't been updated in years. Is this still the right git repository to use or should I pivot to
https://github.com/3rdIteration/btcrecover ?
Edit: I also noticed this message from Blockchain. Now that I've extracted my file, would I be impacted by this with BTCRecover?
"Important Note Some older blockchain.com wallets (2014-2015 era at least, perhaps more) have a bug where some private keys were incorrectly encoded and saved to the wallet file... (Basically if the hex encoded private key included any leading zeroes, these were left off, leading to private keys that are less than 32 bytes... The current blockchain.com simply rejects these as invalid and assumes an incorrect password...) The symptoms of this are that your wallet may have correctly worked until about 2015/2016"
Thanks, I'll keep you all posted.
----------------------------------
Edit2: I was able to remember my Main Wallet Password and Second Password for one of the two wallets! Sadly, while I could see all of my old transactions, there was nothing left.
Now to figure out how to brute force the main password for my second wallet...