Skip to the content.

Velcro

Velcro is a toolkit for reading and processing packets from FFXIV. The toolkit is designed to be modular, with different applications attaching to the inputs and outputs of each other. The primary message format is JSON Lines, with a schema described (here, TBD).

Velcro applications

velcro is the core application component of the toolkit. velcro supports both input and output streams, and it archives packet data in a SQLite database. This data can be queried using DBeaver or another SQLite viewer to perform complex transformation, filtering, and aggregation operations over the collected data. DBeaver can then directly open a binary editor to study packet data in greater detail.

xivsniff functions as the data producer of the toolkit. It simply reads packet data and writes it to its standard output stream.

The toolkit

Installation

This section documents Velcro’s installation process for each key component.

xivsniff

This is the data producer for the toolkit. Installation is as follows:

  1. Ensure you have either WinPcap or npcap installed.
  2. Download the .exe from the latest release here.
  3. Put the file somewhere accessible and add it to your PATH environment variable.
  4. Reload any terminals you have open and try to run xivsniff. If it prints an error saying it can’t find an active game instance, feel free to ignore it.

You can run xivsniff while FFXIV is running, and it will print JSON Lines data to the console. This can either be saved to a file, left in the console, or piped to another Velcro application. Next, we’ll install velcro.

velcro

This is the primary data consumer for the toolkit at this time. It also functions as a producer, streaming any data it receives to its own standard output. Installation is as follows.

  1. Download the .exe from the latest release here.
  2. Rename it to velcro.exe for convenience.
  3. Put the file somewhere accessible and add it to your PATH environment variable.

DBeaver (optional)

Install DBeaver using its downloadable installer. Its Community Edition is free for personal use.

ImHex (optional)

Install ImHex using its downloadable installer.

Usage

Launch FFXIV and log in. Then, fire up cmd or bash (or your own sh derivative of choice) and create a new folder for your database. Navigate to it in your shell and run:

xivsniff | velcro

Your terminal should be filled with data lines. If you happen to dislike this, you might want to redirect the end of your pipeline to a null file descriptor:

cmd

xivsniff | velcro > NUL

bash etc.

xivsniff | velcro > /dev/null

This will create a file called velcro.db and some related files in your working directory. Open this in DBeaver and run SQL queries on the messages table to explore the data.

You can perform offset searches on the data column by using the SQLite functions substr(quote(data), 3 + N * 2, M * 2), replacing N with your desired offset, and M with the number of bytes to search for. You can also perform offset-invariant searches by using conditions similar to quote(data) LIKE "%FFFF%".

Clicking on a data instance will bring up a hexdump of the BLOB. Using the button labeled “Open in external editor” you can open the object in ImHex to analyze it.

With these tools, you can effectively collect and analyze packet data.

Notes on Powershell

Powershell has its own conventions distinct from cmd and bash-based shells. Because of this, pipes into typical programs require special handling. It’s best to just avoid Powershell when using velcro. However, you can force it to work with something like this:

xivsniff | Out-String -stream | velcro > $null

Design tenets

Future additions