Jump to content

Metin2 Cheat Python Dumper - PyRun_SimpleStringFlags


Recommended Posts

M2 Download Center

This is the hidden content, please
( Internal )

Author : KoMaR1911

Github + source code :

This is the hidden content, please

 

How to use?:

1. Inject PyRunSimpleStringFlagsDumperMetin2.dll to metin2 game process using Xenos Injector / Extreme Injector

2. Inject cheat to game

3. go to C:/dump.txt

here is dumped python loaded by PyRun_SimpleStringFlags

 

Download :

This is the hidden content, please

  • Metin2 Dev 128
  • kekw 2
  • Eyes 7
  • Dislove 4
  • Angry 2
  • Not Good 2
  • Smile Tear 1
  • Think 4
  • Confused 3
  • Scream 5
  • Lmao 1
  • Good 53
  • Love 19
  • Love 100
Link to comment
Share on other sites

  • Premium

https://metin2.download/picture/f2yKL37A1Z7N0D9UqyZDNOPWl7xbf7YY/.png https://metin2.download/picture/1t3J39sbF3fPW41UQMkGX6tmzZr4jo7t/.png mm 

Spoiler

import app
if app.RunPythonFile('a.py'):
	print ("Hello there, I'm Hacker !")

 

 

Edited by Metin2 Dev
Core X - External 2 Internal
  • Metin2 Dev 9
  • Think 2
  • Confused 1
  • Good 1
  • Love 3
  • Love 3
Link to comment
Share on other sites

here is m2bob dump :

 

This is the hidden content, please

 

as i see they load python everytime they want to use feature like expbot etc thats why dump is 4mb and looks like this :

4UhtMti.png

 

probably thats why m2bob crashs after 20-40 minutes XD

Edited by Metin2 Dev
Core X - External 2 Internal
  • Metin2 Dev 29
  • Dislove 1
  • Angry 2
  • Cry 1
  • Smile Tear 1
  • Think 2
  • Confused 1
  • Good 12
  • Love 1
  • Love 14
Link to comment
Share on other sites

  • Premium
15 hours ago, Kyo said:

Right, but most of private servers has linked python static and removed that function ofc there is another method. But thx for tool.

There are other functions that can load scripts, not just that.

You can get rid of the problem by playing a bit with python and client source.

Link to comment
Share on other sites

  • 1 year later...
  • 3 months later...
  • 1 month later...

Sometimes pattern is different (when someone use for example optimalization or different compiler than visual studio)

1. Start IDA Pro then install Sig Maker to IDA Pro
 

2. check how PyRun_SimpleStringFlags looks for example on github

This is the hidden content, please

as you can see function PyRun_SimpleStringFlags have string "__main__" and 1 function upper (PyRun_SimpleFileExFlags) "python: Can't reopen .pyc file\n"

3. find "python: Can't reopen .pyc file\n"
4. skip this function and go to next function

new functions in 90% starts with

PUSH ebp

MOV ebp, esp

RoQXQCL.png  (i know sometimes its different but im trying to explain it for newbies only!!!)

5. if next functions have string "__main__" probably its your PyRun_SimpleStringFlags
6. Make new pattern and paste it to source

i dont know how to explain it better for people who don't have any experience with Reverse Engineering so if you have any questions how to do it just ask 🙂

Edited by Metin2 Dev
Core X - External 2 Internal
  • Metin2 Dev 26
  • Angry 1
  • Smile Tear 1
  • Confused 1
  • Scream 1
  • Lmao 1
  • Good 11
  • Love 3
  • Love 17
Link to comment
Share on other sites

  • 1 month later...

Announcements



×
×
  • Create New...

Important Information

Terms of Use / Privacy Policy / Guidelines / We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.