[Release] Python Loader for All 32/64bit Servers

06/03/2025 15:19 tgna1920#16
Has anyone tried it on GF?

Red ban or has anyone tried it on GF to see if it works?
06/12/2025 13:45 cookiechaser#17
Quote:
Originally Posted by Gabrielaelle View Post
how safe is this to use on the GF servers?
no idea, never tried it on gf
06/17/2025 00:53 FoRtZa***DyNaMo#18
cookiechaser u trade stmod.py?
06/25/2025 14:35 islam55567#19
i need stmod.py file can you send it to me ?
07/05/2025 02:46 starlord02#20
I sent you a message on discord
07/07/2025 01:36 Fatality334#21
Can u guys send me the STMOD too ?
07/08/2025 16:03 g0khanbey#22
source code ?
09/30/2025 02:05 06semih061#23
Oour need working all anticheat Python Loader
10/05/2025 01:46 lolpt#24
Anyone managed to put this working?
10/31/2025 21:05 asasinq#25
Quote:
Originally Posted by cookiechaser View Post
Releasing the external (no injection needed) python loader i made yesterday, the video is just for demonstration, the download DOES NOT include stmod scripts or anything related to it

The python loader uses shellcode to load python scripts for both 32 and 64bit servers, with or without python27.dll

[Only registered and activated users can see links. Click Here To Register...]

[Only registered and activated users can see links. Click Here To Register...]

[Only registered and activated users can see links. Click Here To Register...]

If the injector doesn't work for some server, message me on
discord: bromoket
Or PM me here/reply to this thread

Obviously this won't work work CShield and other good protected servers,
but if you need one DM me on discord
Hello, it worked for me, thank you. Can you also do it in .dll? ♥♥♥
11/14/2025 21:19 Mrr3d#26
[2025-11-14 22:17:46.018] [INFO] Virtual terminal processing enabled.
[2025-11-14 22:17:46.025] [INFO] Successfully enabled SE_DEBUG_NAME privilege for the current process.
[2025-11-14 22:17:46.103] [INFO] Direct3D9 device created successfully.
[2025-11-14 22:17:46.186] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:17:46.191] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:17:46.194] [INFO] Process scan complete. Found 0 processes matching criteria.
[2025-11-14 22:17:47.870] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:17:47.871] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:17:47.872] [INFO] Process scan complete. Found 1 processes matching criteria.
[2025-11-14 22:17:48.636] [INFO] Attempting to open process: gameclient.exe (PID: 7544)
[2025-11-14 22:17:48.636] [INFO] Successfully opened process gameclient.exe (PID: 7544). Handle: 0x470
[2025-11-14 22:17:48.657] [INFO] Identified main thread ID for PID 7544: 8628
[2025-11-14 22:17:48.657] [INFO] Main module base: 0x1000000, Size: 0x7fd000
[2025-11-14 22:17:48.658] [INFO] Got module info: Base=0x1000000, Size=0x7fd000
[2025-11-14 22:17:48.658] [INFO] Process (handle: 0x470) is 32-bit (running under WOW64).
[2025-11-14 22:17:48.658] [INFO] Target process is not 64-bit.
[2025-11-14 22:17:48.660] [INFO] Module 'python27.dll' found at address: 0x1e000000
[2025-11-14 22:17:48.660] [INFO] python27.dll found in target process at 0x1e000000. Attempting to get export addresses.
[2025-11-14 22:17:48.682] [INFO] Found export 'PyRun_StringFlags' at address: 0x1e114790 in module 0x1e000000 (RVA: 0x114790, Ordinal: 587)
[2025-11-14 22:17:48.694] [INFO] Found export 'PyImport_AddModule' at address: 0x1e0fdf50 in module 0x1e000000 (RVA: 0xfdf50, Ordinal: 312)
[2025-11-14 22:17:48.711] [INFO] Found export 'PyModule_GetDict' at address: 0x1e0a8fb0 in module 0x1e000000 (RVA: 0xa8fb0, Ordinal: 425)
[2025-11-14 22:17:48.712] [INFO] All required Python 2.7 exports found.
[2025-11-14 22:17:54.368] [INFO] Selected script for injection: C:\Users\Ahmed El Helow\Desktop\Mt2Kings\iPUSH.py
[2025-11-14 22:18:01.858] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:18:01.859] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:18:01.860] [INFO] Process scan complete. Found 0 processes matching criteria.
[2025-11-14 22:18:09.252] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:18:09.253] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:18:09.255] [INFO] Process scan complete. Found 0 processes matching criteria.
[2025-11-14 22:18:10.151] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:18:10.152] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:18:10.154] [INFO] Process scan complete. Found 1 processes matching criteria.
[2025-11-14 22:18:11.150] [INFO] Attempting to open process: gameclient.exe (PID: 9884)
[2025-11-14 22:18:11.151] [INFO] Successfully opened process gameclient.exe (PID: 9884). Handle: 0xe28
[2025-11-14 22:18:11.173] [INFO] Identified main thread ID for PID 9884: 3588
[2025-11-14 22:18:11.174] [INFO] Main module base: 0x1000000, Size: 0x7fd000
[2025-11-14 22:18:11.175] [INFO] Got module info: Base=0x1000000, Size=0x7fd000
[2025-11-14 22:18:11.176] [INFO] Process (handle: 0xe28) is 32-bit (running under WOW64).
[2025-11-14 22:18:11.177] [INFO] Target process is not 64-bit.
[2025-11-14 22:18:11.179] [INFO] Module 'python27.dll' found at address: 0x1e000000
[2025-11-14 22:18:11.181] [INFO] python27.dll found in target process at 0x1e000000. Attempting to get export addresses.
[2025-11-14 22:18:11.205] [INFO] Found export 'PyRun_StringFlags' at address: 0x1e114790 in module 0x1e000000 (RVA: 0x114790, Ordinal: 587)
[2025-11-14 22:18:11.217] [INFO] Found export 'PyImport_AddModule' at address: 0x1e0fdf50 in module 0x1e000000 (RVA: 0xfdf50, Ordinal: 312)
[2025-11-14 22:18:11.235] [INFO] Found export 'PyModule_GetDict' at address: 0x1e0a8fb0 in module 0x1e000000 (RVA: 0xa8fb0, Ordinal: 425)
[2025-11-14 22:18:11.236] [INFO] All required Python 2.7 exports found.
[2025-11-14 22:18:12.324] [INFO] Attempting Python script injection: 'C:\Users\Ahmed El Helow\Desktop\Mt2Kings\iPUSH.py' into PID: 9884
[2025-11-14 22:18:12.325] [INFO] Using python27.dll export injection method.
[2025-11-14 22:18:12.326] [INFO] Allocated 164 bytes (prot: 0x4) at 0x96b0000 in process handle 0xe28
[2025-11-14 22:18:12.327] [INFO] Allocated 9 bytes (prot: 0x4) at 0x9ce0000 in process handle 0xe28
[2025-11-14 22:18:12.328] [INFO] Py27Inject: Loader script (164 bytes) and __main__ (9 bytes) written to target process.
[2025-11-14 22:18:12.329] [INFO] Allocated 55 bytes (prot: 0x40) at 0x9d10000 in process handle 0xe28
[2025-11-14 22:18:12.330] [INFO] Py27Inject: Shellcode (55 bytes) written to 0x9d10000
[2025-11-14 22:18:12.330] [INFO] Py27Inject: CreateRemoteThread success. Waiting for thread...
[2025-11-14 22:18:14.034] [INFO] Py27Inject: Remote thread finished. Exit code: 3221225477 (Check target console/log for Python output/errors)
[2025-11-14 22:18:14.035] [ERROR] VirtualFreeEx failed for address 0x9d10000 in process handle 0xe28. Error: 5
[2025-11-14 22:18:14.036] [ERROR] VirtualFreeEx failed for address 0x96b0000 in process handle 0xe28. Error: 5
[2025-11-14 22:18:14.037] [ERROR] VirtualFreeEx failed for address 0x9ce0000 in process handle 0xe28. Error: 5
[2025-11-14 22:18:14.038] [INFO] Py27Inject: Freed allocated memory (loader, __main__, shellcode).
[2025-11-14 22:18:14.038] [INFO] Python 2.7 script injection reported success.



How i fix that please ? the server use c shield
11/23/2025 09:06 dave_m#27
@[Only registered and activated users can see links. Click Here To Register...]
Your error looks mostly like the injection failed because of some server protections
maybe it can help if you start the injector in admin or system-user mode
12/17/2025 21:16 qespero27#28
Can u update for rubinum?
12/19/2025 01:21 SchmiddiDerGrosse#29
cookiechaser is there a chance you give the source code? Because i tried to get multi window support to work in screen capture bots but its too hard for me to get the focus right.
12/19/2025 20:55 bromoket#30
Quote:
Originally Posted by SchmiddiDerGrosse View Post
cookiechaser is there a chance you give the source code? Because i tried to get multi window support to work in screen capture bots but its too hard for me to get the focus right.
nope, since its external. make your own dll, or write an external one using shellcode. not that hard, there are public sources available.