Metadata-Version: 1.1
Name: padsniff
Version: 1.0.1
Summary: Command-line tool to sniff Puzzle & Dragons data.
Home-page: https://bitbucket.org/necromanteion/padsniff
Author: Will Medlar
Author-email: wmmedlar@gmail.com
License: MIT
Description: # Padsniff: A Puzzle & Dragons HTTP Sniffer
        -------------------------------------------
        
        |PyPI|\ |CircleCI|
        
        Quickstart
        ----------
        
        .. code:: shell
        
            $ pip install padsniff
        
        Padsniff can be used as either a cli:
        
        .. code:: shell
        
            $ padsniff run --port 8080 --script examples/log_plus_eggs.py
            runs:   1 | hp:   1 | atk:   1 | rcv:   2
            [...]
        
        ... or as a library!
        
        .. code:: python
        
            import padsniff
            import json
        
            @padsniff.on(action='get_player_data')
            def hello(request, response):
                username = json.loads(response.content.decode())['name']
                print('Hello, %s!' % username)
        
            if __name__ == '__main__':
                proxy = padsniff.Proxy()
                proxy.run()
        
        Check out the `examples <examples/>`__ for more cool ideas.
        
        Installation
        ------------
        
        Padsniff requires Python 3.5+. Install it with your package manager or
        using `pyenv <https://github.com/yyuu/pyenv>`__.
        
        .. code:: shell
        
            $ pyenv update && pyenv install 3.5.2
            $ pyenv shell 3.5.2
        
        See the `suggested build
        environment <https://github.com/yyuu/pyenv/wiki#suggested-build-environment>`__
        page if you're having trouble getting pyenv to work.
        
        OSX
        ~~~
        
        Apple removed the OpenSSL headers in *El Capitan*, so you'll have to set
        some environment variables before installing ``padsniff``'s
        dependencies.
        
        .. code:: shell
        
            $ brew install openssl
            $ export ARCHFLAGS="-arch x86_64" LDFLAGS="-L/usr/local/opt/openssl/lib" CFLAGS="-I/usr/local/opt/openssl/include"
            $ pip install padsniff
        
        Padsniff depends on mitmproxy's transparent proxying capabilities.
        Follow their
        `instructions <http://docs.mitmproxy.org/en/stable/transparent/osx.html>`__
        to set up your device.
        
        Debian / Ubuntu
        ~~~~~~~~~~~~~~~
        
        Padsniff includes a pretty heavy list of dependencies, including
        `lxml <http://lxml.de/>`__ and
        `cryptography <https://cryptography.io/>`__. You'll need to install some
        of their dependencies via your package manager.
        
        .. code:: shell
        
            $ sudo apt-get install -y build-essential libffi-dev libssl-dev libxml2-dev libxslt-dev python3-dev
            $ export LC_ALL=C.UTF-8 LANG=C.UTF-8
            $ pip install padsniff
        
        This will also set up your environment to support
        `click <http://click.pocoo.org/>`__, the library that powers padsniff's
        command line interface.
        
        Padsniff depends on mitmproxy's transparent proxying capabilites. Follow
        their
        `instructions <http://docs.mitmproxy.org/en/stable/transparent/linux.html>`__
        to set up your device.
        
        Development
        ~~~~~~~~~~~
        
        .. code:: shell
        
            $ git clone git@bitbucket.org:necromanteion/padsniff.git padsniff
            $ cd padsniff
            $ pip install -r dev-requirements.txt -e .
        
        This will install the testing dependencies -- padsniff uses
        `pytest <http://doc.pytest.org/>`__ for unit testing -- and install
        padsniff in `editable
        mode <https://pip.pypa.io/en/stable/reference/pip_install/#editable-installs>`__.
        
        .. |PyPI| image:: https://img.shields.io/pypi/v/padsniff.svg?style=flat-square
           :target: https://pypi.python.org/pypi/padsniff
        .. |CircleCI| image:: https://img.shields.io/circleci/project/bitbucket/necromanteion/padsniff.svg?style=flat-square
           :target: https://circleci.com/bb/necromanteion/padsniff
        
Keywords: puzzle & dragons,man-in-the-middle,reverse engineering
Platform: UNKNOWN
Classifier: Development Status :: 5 - Production/Stable
Classifier: Environment :: Console
Classifier: Intended Audience :: Developers
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.5
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: 3 :: Only
Classifier: Topic :: Games/Entertainment :: Puzzle Games
