Skip to content

Commit 82ed747

Browse files
committed
Updated README
1 parent d75d6f8 commit 82ed747

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,6 @@ Python wrapper for tshark, allowing python packet parsing using wireshark dissec
44

55
Extended documentation: http://kiminewt.github.io/pyshark
66

7-
**Python2 deprecation** - This package no longer supports Python2. If you wish to still use it in Python2, you can:
8-
* Use version 0.3.8
9-
* Install pyshark-legacy via pypi
10-
* Clone the pyshark-legacy [repo](https://github.com/KimiNewt/pyshark-legacy), where bugfixes will be applied.
11-
127
**Looking for contributors** - for various reasons I have a hard time finding time to maintain and enhance the package at the moment. Any pull-requests will be reviewed and if any one is interested and is suitable, I will be happy to include them in the project. Feel free to mail me at dorgreen1 at gmail.
138

149
There are quite a few python packet parsing modules, this one is different because it doesn't actually parse any packets, it simply uses tshark's (wireshark command-line utility) ability to export XMLs to use its parsing.
@@ -18,6 +13,11 @@ Tested on windows/linux.
1813

1914
## Installation
2015

16+
### Version support
17+
Python 3.7+ is supported. An unsupported Python 2 version exists as [pyshark-legacy](https://github.com/KimiNewt/pyshark-legacy).
18+
19+
Supports all modern versions of tshark / wireshark but certain features may be unavailable on older versions.
20+
2121
### All Platforms
2222
Simply run the following to install the latest from pypi
2323
```bash
@@ -100,7 +100,7 @@ be either 'WEP', 'WPA-PWD', or 'WPA-PWK'. Defaults to WPA-PWK.
100100
<UDP/HTTP Packet>
101101

102102
for packet in capture.sniff_continuously(packet_count=5):
103-
print 'Just arrived:', packet
103+
print('Just arrived:', packet)
104104
```
105105

106106
#### Other options
@@ -128,7 +128,7 @@ includes very little information
128128
<UDP/HTTP Packet>
129129

130130
for packet in capture.sniff_continuously(packet_count=5):
131-
print 'Just arrived:', packet
131+
print('Just arrived:', packet)
132132
```
133133

134134
#### Other options
@@ -208,7 +208,7 @@ Source or Destination Address: 10.0.0.10 (10.0.0.10)
208208
>>> p.ip.addr.int_value
209209
167772170
210210
>>> p.ip.addr.binary_value
211-
'\n\x00\x00\n'
211+
b'\n\x00\x00\n'
212212
```
213213

214214

0 commit comments

Comments
 (0)