/pcr-exporter

A tool to parse, process, and export intercepted data from Princess Connect! Re:Dive

Primary LanguageJavaScriptMIT LicenseMIT

Priconne Exporter

Release GitHub release (latest by date) GitHub all releases

A tool to parse, process, and export intercepted data from Princess Connect! Re:Dive game client.

The tool makes it easy to read what the game client is sending, receiving, and making use of said data.
For example: exporting your inventory data to another tool such as pcredivewiki.tw armory.

This tool was forked from Xzandro/sw-exporter, with Summoner's War specific parts gutted out, Princess Connect traffic decryption functionality added, and remaining parts reused.

Screen Shot 2021-11-13 at 17 40 10

Usage

  1. Download the tool in the releases page.
  2. Install and run the tool to generate a root certificate and add this to your device (or emulator).
  3. Point your device (or emulator) running Priconne to the proxy server started by the tool.

Detailed installation steps tailored to specific device/emulators can be found in the wiki.

Plugins

You can create your own plugins that will receive in-game events and data. What you do with that data is up to your imagination.
Take a look at some of the plugin source code as reference.

Current plugins:


More information about the tool can be found in the GitHub Wiki.

Project plan and to-do list is on GitHub Projects.