I posted this in the comments of the past thread, and got PM'd that it'd be better if I I posted it as a new thread. This works but it takes a very long time. Either of the guys who do it can confirm if it's their method.
It takes much longer than I expected to data mine a week. We're talking 3 hours minimum per week. But, here's how you guys can go from there. Im going to do a short write because it's hard to explain netcode quickly.
Tools Needed:
A Packet Sniffer: WireShark
A Network Analyzer: Scrapy
Hex Editor: XVI32
Step 1: Join the tower, try and get a tower instance where you're the only guardian. You'll only see three PVP IP's show up, this is Xur, Destiny Call Back Server, and the other Tower Merchants share the third.
Step 2: Open WireShack and go to Loopback ; lo0 and type the IP you found from Xur as the processing sketch server. This is to relay all Xur's packets in an loop on your network. You can't leave the tower at this point.
Step 3: Open BalldropClient and set the port as TCP 80. Xur has a lot of "noise" the only packets of importance are the ones he sends over Port 80.
Step 4: Open the Hex Editor and copy 23 consecutive packets from WireShark into it. If the 0020 and the 0030 lines show a pattern similar Xur's inventory. 4 same, one off, one off, 5 same, one off, one off. If it does, you MAY have his inventory. To check you have to note 0010 for all 22, check this against a database of all exotic weapon's Hex code. You have to manually find all of the weapons Hex code the same way you found those.
Xur's netcode hex for exotics go
<Name>.2B <Price>.4B <Strange Coins You Have>.4B <Description>.16B <Date>.2B
2B = xx 2 bits
4B = xx 4 bits
16B = xx 16 bits
Step 5: Xur sends out a beacon packet every 750 milliseconds that has date, time remaining, and random noise. You can ignore everything except the beginning 2B and ending 2B.
<Date>.2B <Noise to confuse you>.16B <More Noise>.16B <Time Remaining>.2B
You want to open WireShack and completely copy two of these packets. Next, you use the hex converter to get a 2 Bit snippet for the date forward you want to go to. Now you have to open Scrappy, create a 127.0.0.1 loop by sending all Xur sPort traffic on ports 80, to your dPort server of 127.0.0.1. It is a MUST you keep ports 88, 3074, and 53 open or you'll be disconnected. Once you've created the duplicated packet, you'll inject it using Scrappy, tcp.flag = 0x018. anything bigger will result in a disconnection. If you've done it correctly you should have a loop of packets only on port 80 being manipulated, while the other ports send unedited packets. To do one week would take 3-4 hours. Two weeks, we're talking 8. An individual request would be nearly impossible.