Izarc (search google for your best mirror, I don't want to overload one), can brute-force a zip password (with character range limits if you are sure you used, say, only lowercase alpha).
Even WITH limits, it's still painfully slow, as each additional character means an exponential increase in combinations.
If the password is vulnerable to dictionary attack, then that's another way.
Other password crackers can use a better technique, the "known plaintext attack" if you have an identical copy of any file in the archive.