Skip to content

Commit

Permalink
update README file
Browse files Browse the repository at this point in the history
  • Loading branch information
kakaroto committed Jan 5, 2016
1 parent 7769a81 commit d10fd23
Showing 1 changed file with 10 additions and 8 deletions.
18 changes: 10 additions & 8 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,15 +1,20 @@
# Summoners War Monsters & Runes Parser

This tool will parse pcap files captured from the initial Summoners War login data and extract information on the monsters and runes of the user.
This tool will parse data captured from the initial Summoners War login data and extract information on the monsters and runes of the user.

This tool was created with a single purpose: Exporting the runes so it can be used with external tools, such as the Rune Optimizer by Redeemer40 available here : http://www.graphactory.eu/sw/

# Data capture
## SWProxy
The easiest and safest method is to use the SWProxy application which will run a small proxy server on your machine. You will then need to set the proxy settings in your Android or IOS device to the IP and Port displayed by SWProxy and wait for the data to appear.
In order to get login data, make sure you quit Summoners War and log back in with the proxy enabled.

## SWParser
The SWParser will parse a pcap file containing a network capture of the Summoners War login information.
You will need a pcap file that can be captured either by configuring a proxy (such as Charles or Fiddler) and capturing the pcap file with Wireshark or using a capture application such as tPacketCapture.
See https://www.reddit.com/r/summonerswar/comments/3yzb02/releasing_the_sw_monsters_runes_extractor/cyi2adn for instructions on how to capture the pcap file on IOS or Android using a proxy (safest option).
See https://www.reddit.com/r/summonerswar/comments/3yzb02/releasing_the_sw_monsters_runes_extractor/cyi2adn for instructions on how to capture the pcap file on IOS or Android using a proxy and wireshark.
See https://youtu.be/fimW1n5PSX0 for instructions on how to capture the pcap file on Android using tPacketCapture.

## Parsing the data
### Parsing the data
Run the SWParser.py with the pcap file as an argument. It will parse the captured data, find the login information and export a few files with all the information on your account.
That's all you need to do.

Expand All @@ -28,11 +33,8 @@ The monsters are listed in the same order they would appear in your box if you s
The monsters listed for a visited friend are in the same order as his box as well (which is not actually sorted by grade).

## Visiting friends
You can visit friends (or people from chat, or arena rankings, etc..) and the script will create a visit-<name>-monsters.csv file with all of their monsters (their equipped runes are also available but they are not exported). Note that their monsters that are in storage will also be visible in the CSV file even though the game doesn't show them.
You can visit friends (or people from chat, or arena rankings, etc..) and the script will create a visit-<name>-monsters.csv file with all of their monsters and their equipped runes. Note that their monsters that are in storage will also be visible in the CSV file even though the game doesn't show them.

## Optimizer data
The optimizer.json file can be directly loaded on the Rune Optimizer app available here : http://www.graphactory.eu/sw/
Simply open the file with a text editor and copy/paste the data into the import section of the web app and press Import.

## Monster names
Monsters are identified by their ID which is a 5 digit number. The first 3 digits uniquely identify the monster type, for example 101=Fairy, 102=Imp, 103=Pixie, etc.. The 4th digit is set to 1 when the monster is awakened and 0 when it's not, and the 5th digit represents the attribute (1=Water, 2=Fire, 3=Wind, 4=Light, 5=Dark), so for example, 10102=Fire Fairy, 10313=Shannon(Awakened Wind Pixie)

0 comments on commit d10fd23

Please sign in to comment.