Look into Hashcat and oclHashcat, but if they don't work, there is almost nothing you can do.
It should NEVER be possible to do as you ask.
Hashes are not encrypted data; Hashing is a one-way permanent translation from input to output, so it cannot be "decrypted".
Encryption relies on its passphrase to protect its ciphered form, so if a password is easily guessed, or inferred by timing or other environmental exploits, there is not necessarily anything wrong with the encryption system; it may just be being used poorly.
When someone can infer the original values for a hash however, then the hashing algorithm is broken, and everyone stops using it, because it is no longer safe for any purposes whatsoever.
4A hash is a hash is a hash. Not something you could decrypt. – ott-- – 2015-02-03T20:06:54.610
3As well, why would you post the hash online to a community of millions of people? Shouldn't be that important than... – Canadian Luke – 2015-02-03T20:09:22.473
1your only recourse is rubber-hose cryptanalysis – meatspace – 2015-02-03T20:13:22.317
The simplest solution would be to replace the hash that was generated from a password you know. This is possible in most cases on Windows I have no idea if its possible on the version of OS X your using. – Ramhound – 2015-02-03T20:15:32.303
possible duplicate of What software can I use to decrypt a Mac OS X password hash?, and/or How to reset forgotten Administrator password on MacO X?
– Ƭᴇcʜιᴇ007 – 2015-02-03T21:07:55.800@Techie007, I don't think this needs reopened, but please note that the threads linked as duplicates with answers do not in fact answer the question, and the op has explicitly rejected answers based on password resets, rather than hash-cracking. the linked answers are just about password resets which may not allow access to previously encrypted data, etc. – Frank Thomas – 2015-02-04T13:03:35.913