|
You last visited: Today at 15:26
Advertisement
[Release] Python Loader for All 32/64bit Servers
Discussion on [Release] Python Loader for All 32/64bit Servers within the Metin2 Hacks, Bots, Cheats, Exploits & Macros forum part of the Metin2 category.
06/03/2025, 15:19
|
#16
|
elite*gold: 0
Join Date: Oct 2023
Posts: 21
Received Thanks: 2
|
Has anyone tried it on GF?
Red ban or has anyone tried it on GF to see if it works?
|
|
|
06/12/2025, 13:45
|
#17
|
elite*gold: 0
Join Date: Apr 2019
Posts: 21
Received Thanks: 31
|
Quote:
Originally Posted by Gabrielaelle
how safe is this to use on the GF servers?
|
no idea, never tried it on gf
|
|
|
06/17/2025, 00:53
|
#18
|
elite*gold: 0
Join Date: Sep 2009
Posts: 95
Received Thanks: 14
|
cookiechaser u trade stmod.py?
|
|
|
06/25/2025, 14:35
|
#19
|
elite*gold: 0
Join Date: Mar 2025
Posts: 1
Received Thanks: 0
|
i need stmod.py file can you send it to me ?
|
|
|
07/05/2025, 02:46
|
#20
|
elite*gold: 0
Join Date: Jun 2025
Posts: 1
Received Thanks: 0
|
I sent you a message on discord
|
|
|
07/07/2025, 01:36
|
#21
|
elite*gold: 0
Join Date: Dec 2021
Posts: 1
Received Thanks: 0
|
Can u guys send me the STMOD too ?
|
|
|
07/08/2025, 16:03
|
#22
|
elite*gold: 0
Join Date: Feb 2024
Posts: 5
Received Thanks: 0
|
source code ?
|
|
|
09/30/2025, 02:05
|
#23
|
elite*gold: 0
Join Date: May 2025
Posts: 3
Received Thanks: 0
|
Oour need working all anticheat Python Loader
|
|
|
10/05/2025, 01:46
|
#24
|
elite*gold: 0
Join Date: Jan 2012
Posts: 10
Received Thanks: 0
|
Anyone managed to put this working?
|
|
|
10/31/2025, 21:05
|
#25
|
elite*gold: 0
Join Date: Jul 2013
Posts: 4
Received Thanks: 0
|
Quote:
Originally Posted by cookiechaser
|
Hello, it worked for me, thank you. Can you also do it in .dll? ♥♥♥
|
|
|
11/14/2025, 21:19
|
#26
|
elite*gold: 0
Join Date: Dec 2020
Posts: 3
Received Thanks: 0
|
[2025-11-14 22:17:46.018] [INFO] Virtual terminal processing enabled.
[2025-11-14 22:17:46.025] [INFO] Successfully enabled SE_DEBUG_NAME privilege for the current process.
[2025-11-14 22:17:46.103] [INFO] Direct3D9 device created successfully.
[2025-11-14 22:17:46.186] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:17:46.191] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:17:46.194] [INFO] Process scan complete. Found 0 processes matching criteria.
[2025-11-14 22:17:47.870] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:17:47.871] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:17:47.872] [INFO] Process scan complete. Found 1 processes matching criteria.
[2025-11-14 22:17:48.636] [INFO] Attempting to open process: gameclient.exe (PID: 7544)
[2025-11-14 22:17:48.636] [INFO] Successfully opened process gameclient.exe (PID: 7544). Handle: 0x470
[2025-11-14 22:17:48.657] [INFO] Identified main thread ID for PID 7544: 8628
[2025-11-14 22:17:48.657] [INFO] Main module base: 0x1000000, Size: 0x7fd000
[2025-11-14 22:17:48.658] [INFO] Got module info: Base=0x1000000, Size=0x7fd000
[2025-11-14 22:17:48.658] [INFO] Process (handle: 0x470) is 32-bit (running under WOW64).
[2025-11-14 22:17:48.658] [INFO] Target process is not 64-bit.
[2025-11-14 22:17:48.660] [INFO] Module 'python27.dll' found at address: 0x1e000000
[2025-11-14 22:17:48.660] [INFO] python27.dll found in target process at 0x1e000000. Attempting to get export addresses.
[2025-11-14 22:17:48.682] [INFO] Found export 'PyRun_StringFlags' at address: 0x1e114790 in module 0x1e000000 (RVA: 0x114790, Ordinal: 587)
[2025-11-14 22:17:48.694] [INFO] Found export 'PyImport_AddModule' at address: 0x1e0fdf50 in module 0x1e000000 (RVA: 0xfdf50, Ordinal: 312)
[2025-11-14 22:17:48.711] [INFO] Found export 'PyModule_GetDict' at address: 0x1e0a8fb0 in module 0x1e000000 (RVA: 0xa8fb0, Ordinal: 425)
[2025-11-14 22:17:48.712] [INFO] All required Python 2.7 exports found.
[2025-11-14 22:17:54.368] [INFO] Selected script for injection: C:\Users\Ahmed El Helow\Desktop\Mt2Kings\iPUSH.py
[2025-11-14 22:18:01.858] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:18:01.859] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:18:01.860] [INFO] Process scan complete. Found 0 processes matching criteria.
[2025-11-14 22:18:09.252] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:18:09.253] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:18:09.255] [INFO] Process scan complete. Found 0 processes matching criteria.
[2025-11-14 22:18:10.151] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:18:10.152] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:18:10.154] [INFO] Process scan complete. Found 1 processes matching criteria.
[2025-11-14 22:18:11.150] [INFO] Attempting to open process: gameclient.exe (PID: 9884)
[2025-11-14 22:18:11.151] [INFO] Successfully opened process gameclient.exe (PID: 9884). Handle: 0xe28
[2025-11-14 22:18:11.173] [INFO] Identified main thread ID for PID 9884: 3588
[2025-11-14 22:18:11.174] [INFO] Main module base: 0x1000000, Size: 0x7fd000
[2025-11-14 22:18:11.175] [INFO] Got module info: Base=0x1000000, Size=0x7fd000
[2025-11-14 22:18:11.176] [INFO] Process (handle: 0xe28) is 32-bit (running under WOW64).
[2025-11-14 22:18:11.177] [INFO] Target process is not 64-bit.
[2025-11-14 22:18:11.179] [INFO] Module 'python27.dll' found at address: 0x1e000000
[2025-11-14 22:18:11.181] [INFO] python27.dll found in target process at 0x1e000000. Attempting to get export addresses.
[2025-11-14 22:18:11.205] [INFO] Found export 'PyRun_StringFlags' at address: 0x1e114790 in module 0x1e000000 (RVA: 0x114790, Ordinal: 587)
[2025-11-14 22:18:11.217] [INFO] Found export 'PyImport_AddModule' at address: 0x1e0fdf50 in module 0x1e000000 (RVA: 0xfdf50, Ordinal: 312)
[2025-11-14 22:18:11.235] [INFO] Found export 'PyModule_GetDict' at address: 0x1e0a8fb0 in module 0x1e000000 (RVA: 0xa8fb0, Ordinal: 425)
[2025-11-14 22:18:11.236] [INFO] All required Python 2.7 exports found.
[2025-11-14 22:18:12.324] [INFO] Attempting Python script injection: 'C:\Users\Ahmed El Helow\Desktop\Mt2Kings\iPUSH.py' into PID: 9884
[2025-11-14 22:18:12.325] [INFO] Using python27.dll export injection method.
[2025-11-14 22:18:12.326] [INFO] Allocated 164 bytes (prot: 0x4) at 0x96b0000 in process handle 0xe28
[2025-11-14 22:18:12.327] [INFO] Allocated 9 bytes (prot: 0x4) at 0x9ce0000 in process handle 0xe28
[2025-11-14 22:18:12.328] [INFO] Py27Inject: Loader script (164 bytes) and __main__ (9 bytes) written to target process.
[2025-11-14 22:18:12.329] [INFO] Allocated 55 bytes (prot: 0x40) at 0x9d10000 in process handle 0xe28
[2025-11-14 22:18:12.330] [INFO] Py27Inject: Shellcode (55 bytes) written to 0x9d10000
[2025-11-14 22:18:12.330] [INFO] Py27Inject: CreateRemoteThread success. Waiting for thread...
[2025-11-14 22:18:14.034] [INFO] Py27Inject: Remote thread finished. Exit code: 3221225477 (Check target console/log for Python output/errors)
[2025-11-14 22:18:14.035] [ERROR] VirtualFreeEx failed for address 0x9d10000 in process handle 0xe28. Error: 5
[2025-11-14 22:18:14.036] [ERROR] VirtualFreeEx failed for address 0x96b0000 in process handle 0xe28. Error: 5
[2025-11-14 22:18:14.037] [ERROR] VirtualFreeEx failed for address 0x9ce0000 in process handle 0xe28. Error: 5
[2025-11-14 22:18:14.038] [INFO] Py27Inject: Freed allocated memory (loader, __main__, shellcode).
[2025-11-14 22:18:14.038] [INFO] Python 2.7 script injection reported success.
How i fix that please ? the server use c shield
|
|
|
11/23/2025, 09:06
|
#27
|
elite*gold: 0
Join Date: May 2023
Posts: 65
Received Thanks: 11
|
@ 
Your error looks mostly like the injection failed because of some server protections
maybe it can help if you start the injector in admin or system-user mode
|
|
|
12/17/2025, 21:16
|
#28
|
elite*gold: 0
Join Date: Apr 2011
Posts: 3
Received Thanks: 0
|
Can u update for rubinum?
|
|
|
12/19/2025, 01:21
|
#29
|
elite*gold: 0
Join Date: Dec 2025
Posts: 2
Received Thanks: 0
|
cookiechaser is there a chance you give the source code? Because i tried to get multi window support to work in screen capture bots but its too hard for me to get the focus right.
|
|
|
12/19/2025, 20:55
|
#30
|
elite*gold: 0
Join Date: Nov 2025
Posts: 1
Received Thanks: 0
|
Quote:
Originally Posted by SchmiddiDerGrosse
cookiechaser is there a chance you give the source code? Because i tried to get multi window support to work in screen capture bots but its too hard for me to get the focus right.
|
nope, since its external. make your own dll, or write an external one using shellcode. not that hard, there are public sources available.
|
|
|
 |
|
Similar Threads
|
[Python-Modul]EXP-Donator (kompatibel mit Python Loader)
11/23/2013 - Metin2 Hacks, Bots, Cheats, Exploits & Macros - 27 Replies
Moin,
da man mich danach gefragt hat und ich sowieso mal ein Beispiel für die Benutzung meines Python Loaders veröffentlichen wollte, habe ich die Gelegenheit genutzt und euch eben einen EXP-Spendebot geschrieben.
Man kann ihn einfach mit dem oben verlinkten Python Module Loader laden und ihn mit F5 aktivieren/deaktivieren.
Sobald ihr mehr als 99 Erfahrungspunkte habt (man kann nur in 100er Schritten spenden), werden alle Erfahrungspunkte an eure Gilde gespendet.
Wer Lust hat und...
|
[Python]Python Loader vs import
07/29/2013 - Metin2 Private Server - 2 Replies
when i tried to inject my bot with this
pyScrLoader = ui.PythonScriptLoader()
pyScrLoader.LoadScriptFile(self, "eigenartig/mainboard.py")
syserr shows me:
0728 16:55:05139 :: CEffectManager::RegisterEffect - LoadScript(d:/ymir work/effect/hit/percent_damage1.mse) Error
0728 16:55:05139 :: CInstanceBase::RegisterEffect(eEftType=264, c_szEftAttachBone=, c_szEftName=d:/ymir work/effect/hit/percent_damage1.mse, isCache=1) - Error
0728 16:55:05139 :: CEffectManager::RegisterEffect...
|
Help to make a python file works with python loader
03/03/2013 - Metin2 - 2 Replies
Hey epvp! I want make a very. Little hack works on pythonn loader can anybody help me please?
|
[only 64bit] Logtetsch Dinar Bot v.1.0.1 [only 64bit]
03/16/2011 - WarRock Hacks, Bots, Cheats & Exploits - 28 Replies
Allen ein Frohes Weinachtsfest :)
http://www.youtube.com/watch?v=Nuj4Mgpko3A
Hallo alle zusammen!
Heute präsentiere ich euch meinen neuen Logtetsch Dinar bot v.1.0.1 der mit einem automatischem "Administrator" starter eingebaut ist!
|
All times are GMT +1. The time now is 15:27.
|
|