Register for your free account! | Forgot your password?

Go Back   elitepvpers > Popular Games > Metin2 > Metin2 Hacks, Bots, Cheats, Exploits & Macros
You last visited: Today at 15:26

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[Release] Python Loader for All 32/64bit Servers

Discussion on [Release] Python Loader for All 32/64bit Servers within the Metin2 Hacks, Bots, Cheats, Exploits & Macros forum part of the Metin2 category.

Reply
 
Old 06/03/2025, 15:19   #16
 
elite*gold: 0
Join Date: Oct 2023
Posts: 21
Received Thanks: 2
Has anyone tried it on GF?

Red ban or has anyone tried it on GF to see if it works?
tgna1920 is offline  
Old 06/12/2025, 13:45   #17
 
elite*gold: 0
Join Date: Apr 2019
Posts: 21
Received Thanks: 31
Quote:
Originally Posted by Gabrielaelle View Post
how safe is this to use on the GF servers?
no idea, never tried it on gf
cookiechaser is offline  
Old 06/17/2025, 00:53   #18
 
FoRtZa***DyNaMo's Avatar
 
elite*gold: 0
Join Date: Sep 2009
Posts: 95
Received Thanks: 14
cookiechaser u trade stmod.py?
FoRtZa***DyNaMo is offline  
Old 06/25/2025, 14:35   #19
 
elite*gold: 0
Join Date: Mar 2025
Posts: 1
Received Thanks: 0
i need stmod.py file can you send it to me ?
islam55567 is offline  
Old 07/05/2025, 02:46   #20
 
elite*gold: 0
Join Date: Jun 2025
Posts: 1
Received Thanks: 0
I sent you a message on discord
starlord02 is offline  
Old 07/07/2025, 01:36   #21
 
elite*gold: 0
Join Date: Dec 2021
Posts: 1
Received Thanks: 0
Can u guys send me the STMOD too ?
Fatality334 is offline  
Old 07/08/2025, 16:03   #22
 
elite*gold: 0
Join Date: Feb 2024
Posts: 5
Received Thanks: 0
source code ?
g0khanbey is offline  
Old 09/30/2025, 02:05   #23
 
elite*gold: 0
Join Date: May 2025
Posts: 3
Received Thanks: 0
Oour need working all anticheat Python Loader
06semih061 is offline  
Old 10/05/2025, 01:46   #24
 
elite*gold: 0
Join Date: Jan 2012
Posts: 10
Received Thanks: 0
Anyone managed to put this working?
lolpt is offline  
Old 10/31/2025, 21:05   #25
 
elite*gold: 0
Join Date: Jul 2013
Posts: 4
Received Thanks: 0
Quote:
Originally Posted by cookiechaser View Post
Releasing the external (no injection needed) python loader i made yesterday, the video is just for demonstration, the download DOES NOT include stmod scripts or anything related to it

The python loader uses shellcode to load python scripts for both 32 and 64bit servers, with or without python27.dll







If the injector doesn't work for some server, message me on
discord: bromoket
Or PM me here/reply to this thread

Obviously this won't work work CShield and other good protected servers,
but if you need one DM me on discord
Hello, it worked for me, thank you. Can you also do it in .dll? ♥♥♥
asasinq is offline  
Old 11/14/2025, 21:19   #26
 
elite*gold: 0
Join Date: Dec 2020
Posts: 3
Received Thanks: 0
[2025-11-14 22:17:46.018] [INFO] Virtual terminal processing enabled.
[2025-11-14 22:17:46.025] [INFO] Successfully enabled SE_DEBUG_NAME privilege for the current process.
[2025-11-14 22:17:46.103] [INFO] Direct3D9 device created successfully.
[2025-11-14 22:17:46.186] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:17:46.191] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:17:46.194] [INFO] Process scan complete. Found 0 processes matching criteria.
[2025-11-14 22:17:47.870] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:17:47.871] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:17:47.872] [INFO] Process scan complete. Found 1 processes matching criteria.
[2025-11-14 22:17:48.636] [INFO] Attempting to open process: gameclient.exe (PID: 7544)
[2025-11-14 22:17:48.636] [INFO] Successfully opened process gameclient.exe (PID: 7544). Handle: 0x470
[2025-11-14 22:17:48.657] [INFO] Identified main thread ID for PID 7544: 8628
[2025-11-14 22:17:48.657] [INFO] Main module base: 0x1000000, Size: 0x7fd000
[2025-11-14 22:17:48.658] [INFO] Got module info: Base=0x1000000, Size=0x7fd000
[2025-11-14 22:17:48.658] [INFO] Process (handle: 0x470) is 32-bit (running under WOW64).
[2025-11-14 22:17:48.658] [INFO] Target process is not 64-bit.
[2025-11-14 22:17:48.660] [INFO] Module 'python27.dll' found at address: 0x1e000000
[2025-11-14 22:17:48.660] [INFO] python27.dll found in target process at 0x1e000000. Attempting to get export addresses.
[2025-11-14 22:17:48.682] [INFO] Found export 'PyRun_StringFlags' at address: 0x1e114790 in module 0x1e000000 (RVA: 0x114790, Ordinal: 587)
[2025-11-14 22:17:48.694] [INFO] Found export 'PyImport_AddModule' at address: 0x1e0fdf50 in module 0x1e000000 (RVA: 0xfdf50, Ordinal: 312)
[2025-11-14 22:17:48.711] [INFO] Found export 'PyModule_GetDict' at address: 0x1e0a8fb0 in module 0x1e000000 (RVA: 0xa8fb0, Ordinal: 425)
[2025-11-14 22:17:48.712] [INFO] All required Python 2.7 exports found.
[2025-11-14 22:17:54.368] [INFO] Selected script for injection: C:\Users\Ahmed El Helow\Desktop\Mt2Kings\iPUSH.py
[2025-11-14 22:18:01.858] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:18:01.859] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:18:01.860] [INFO] Process scan complete. Found 0 processes matching criteria.
[2025-11-14 22:18:09.252] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:18:09.253] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:18:09.255] [INFO] Process scan complete. Found 0 processes matching criteria.
[2025-11-14 22:18:10.151] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:18:10.152] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:18:10.154] [INFO] Process scan complete. Found 1 processes matching criteria.
[2025-11-14 22:18:11.150] [INFO] Attempting to open process: gameclient.exe (PID: 9884)
[2025-11-14 22:18:11.151] [INFO] Successfully opened process gameclient.exe (PID: 9884). Handle: 0xe28
[2025-11-14 22:18:11.173] [INFO] Identified main thread ID for PID 9884: 3588
[2025-11-14 22:18:11.174] [INFO] Main module base: 0x1000000, Size: 0x7fd000
[2025-11-14 22:18:11.175] [INFO] Got module info: Base=0x1000000, Size=0x7fd000
[2025-11-14 22:18:11.176] [INFO] Process (handle: 0xe28) is 32-bit (running under WOW64).
[2025-11-14 22:18:11.177] [INFO] Target process is not 64-bit.
[2025-11-14 22:18:11.179] [INFO] Module 'python27.dll' found at address: 0x1e000000
[2025-11-14 22:18:11.181] [INFO] python27.dll found in target process at 0x1e000000. Attempting to get export addresses.
[2025-11-14 22:18:11.205] [INFO] Found export 'PyRun_StringFlags' at address: 0x1e114790 in module 0x1e000000 (RVA: 0x114790, Ordinal: 587)
[2025-11-14 22:18:11.217] [INFO] Found export 'PyImport_AddModule' at address: 0x1e0fdf50 in module 0x1e000000 (RVA: 0xfdf50, Ordinal: 312)
[2025-11-14 22:18:11.235] [INFO] Found export 'PyModule_GetDict' at address: 0x1e0a8fb0 in module 0x1e000000 (RVA: 0xa8fb0, Ordinal: 425)
[2025-11-14 22:18:11.236] [INFO] All required Python 2.7 exports found.
[2025-11-14 22:18:12.324] [INFO] Attempting Python script injection: 'C:\Users\Ahmed El Helow\Desktop\Mt2Kings\iPUSH.py' into PID: 9884
[2025-11-14 22:18:12.325] [INFO] Using python27.dll export injection method.
[2025-11-14 22:18:12.326] [INFO] Allocated 164 bytes (prot: 0x4) at 0x96b0000 in process handle 0xe28
[2025-11-14 22:18:12.327] [INFO] Allocated 9 bytes (prot: 0x4) at 0x9ce0000 in process handle 0xe28
[2025-11-14 22:18:12.328] [INFO] Py27Inject: Loader script (164 bytes) and __main__ (9 bytes) written to target process.
[2025-11-14 22:18:12.329] [INFO] Allocated 55 bytes (prot: 0x40) at 0x9d10000 in process handle 0xe28
[2025-11-14 22:18:12.330] [INFO] Py27Inject: Shellcode (55 bytes) written to 0x9d10000
[2025-11-14 22:18:12.330] [INFO] Py27Inject: CreateRemoteThread success. Waiting for thread...
[2025-11-14 22:18:14.034] [INFO] Py27Inject: Remote thread finished. Exit code: 3221225477 (Check target console/log for Python output/errors)
[2025-11-14 22:18:14.035] [ERROR] VirtualFreeEx failed for address 0x9d10000 in process handle 0xe28. Error: 5
[2025-11-14 22:18:14.036] [ERROR] VirtualFreeEx failed for address 0x96b0000 in process handle 0xe28. Error: 5
[2025-11-14 22:18:14.037] [ERROR] VirtualFreeEx failed for address 0x9ce0000 in process handle 0xe28. Error: 5
[2025-11-14 22:18:14.038] [INFO] Py27Inject: Freed allocated memory (loader, __main__, shellcode).
[2025-11-14 22:18:14.038] [INFO] Python 2.7 script injection reported success.



How i fix that please ? the server use c shield
Mrr3d is offline  
Old 11/23/2025, 09:06   #27
 
dave_m's Avatar
 
elite*gold: 0
Join Date: May 2023
Posts: 65
Received Thanks: 11
@
Your error looks mostly like the injection failed because of some server protections
maybe it can help if you start the injector in admin or system-user mode
dave_m is offline  
Old 12/17/2025, 21:16   #28
 
elite*gold: 0
Join Date: Apr 2011
Posts: 3
Received Thanks: 0
Can u update for rubinum?
qespero27 is offline  
Old 12/19/2025, 01:21   #29
 
elite*gold: 0
Join Date: Dec 2025
Posts: 2
Received Thanks: 0
cookiechaser is there a chance you give the source code? Because i tried to get multi window support to work in screen capture bots but its too hard for me to get the focus right.
SchmiddiDerGrosse is offline  
Old 12/19/2025, 20:55   #30
 
elite*gold: 0
Join Date: Nov 2025
Posts: 1
Received Thanks: 0
Quote:
Originally Posted by SchmiddiDerGrosse View Post
cookiechaser is there a chance you give the source code? Because i tried to get multi window support to work in screen capture bots but its too hard for me to get the focus right.
nope, since its external. make your own dll, or write an external one using shellcode. not that hard, there are public sources available.
bromoket is offline  
Reply

Tags
injector, loader, python, ultimate


Similar Threads Similar Threads
[Python-Modul]EXP-Donator (kompatibel mit Python Loader)
11/23/2013 - Metin2 Hacks, Bots, Cheats, Exploits & Macros - 27 Replies
Moin, da man mich danach gefragt hat und ich sowieso mal ein Beispiel für die Benutzung meines Python Loaders veröffentlichen wollte, habe ich die Gelegenheit genutzt und euch eben einen EXP-Spendebot geschrieben. Man kann ihn einfach mit dem oben verlinkten Python Module Loader laden und ihn mit F5 aktivieren/deaktivieren. Sobald ihr mehr als 99 Erfahrungspunkte habt (man kann nur in 100er Schritten spenden), werden alle Erfahrungspunkte an eure Gilde gespendet. Wer Lust hat und...
[Python]Python Loader vs import
07/29/2013 - Metin2 Private Server - 2 Replies
when i tried to inject my bot with this pyScrLoader = ui.PythonScriptLoader() pyScrLoader.LoadScriptFile(self, "eigenartig/mainboard.py") syserr shows me: 0728 16:55:05139 :: CEffectManager::RegisterEffect - LoadScript(d:/ymir work/effect/hit/percent_damage1.mse) Error 0728 16:55:05139 :: CInstanceBase::RegisterEffect(eEftType=264, c_szEftAttachBone=, c_szEftName=d:/ymir work/effect/hit/percent_damage1.mse, isCache=1) - Error 0728 16:55:05139 :: CEffectManager::RegisterEffect...
Help to make a python file works with python loader
03/03/2013 - Metin2 - 2 Replies
Hey epvp! I want make a very. Little hack works on pythonn loader can anybody help me please?
[only 64bit] Logtetsch Dinar Bot v.1.0.1 [only 64bit]
03/16/2011 - WarRock Hacks, Bots, Cheats & Exploits - 28 Replies
Allen ein Frohes Weinachtsfest :) http://www.youtube.com/watch?v=Nuj4Mgpko3A Hallo alle zusammen! Heute präsentiere ich euch meinen neuen Logtetsch Dinar bot v.1.0.1 der mit einem automatischem "Administrator" starter eingebaut ist!



All times are GMT +1. The time now is 15:27.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.