KoMaR1911 502 Posted April 29, 2020 Share Posted April 29, 2020 M2 Download Center This is the hidden content, please Sign In or Sign Up ( Internal ) Author : KoMaR1911 Github + source code : This is the hidden content, please Sign In or Sign Up How to use?: 1. Inject PyRunSimpleStringFlagsDumperMetin2.dll to metin2 game process using Xenos Injector / Extreme Injector 2. Inject cheat to game 3. go to C:/dump.txt here is dumped python loaded by PyRun_SimpleStringFlags Download : This is the hidden content, please Sign In or Sign Up 136 2 7 4 2 2 1 4 3 5 1 53 20 102 Link to comment Share on other sites More sharing options...
Premium Jira 458 Posted April 29, 2020 Premium Share Posted April 29, 2020 (edited) https://metin2.download/picture/f2yKL37A1Z7N0D9UqyZDNOPWl7xbf7YY/.png https://metin2.download/picture/1t3J39sbF3fPW41UQMkGX6tmzZr4jo7t/.png mm Spoiler import app if app.RunPythonFile('a.py'): print ("Hello there, I'm Hacker !") Edited September 4, 2022 by Metin2 Dev Core X - External 2 Internal 9 2 1 1 3 3 Link to comment Share on other sites More sharing options...
Premium Jira 458 Posted April 30, 2020 Premium Share Posted April 30, 2020 37 minutes ago, KoMaR1911 said: This is hook to PyRun_SimpleStringFlags not RunPythonFile Right, but most of private servers has linked python static and removed that function ofc there is another method. But thx for tool. 1 Link to comment Share on other sites More sharing options...
KoMaR1911 502 Posted April 30, 2020 Author Share Posted April 30, 2020 2 hours ago, Kyo said: Right, but most of private servers has linked python static and removed that function ofc there is another method. But thx for tool. so you need to find method what cheat are using then hook it in my source you have example Link to comment Share on other sites More sharing options...
KoMaR1911 502 Posted May 1, 2020 Author Share Posted May 1, 2020 (edited) here is m2bob dump : This is the hidden content, please Sign In or Sign Up as i see they load python everytime they want to use feature like expbot etc thats why dump is 4mb and looks like this : probably thats why m2bob crashs after 20-40 minutes XD Edited August 25, 2022 by Metin2 Dev Core X - External 2 Internal 30 1 2 1 1 2 1 12 1 14 Link to comment Share on other sites More sharing options...
Premium tierrilopes 452 Posted May 1, 2020 Premium Share Posted May 1, 2020 15 hours ago, Kyo said: Right, but most of private servers has linked python static and removed that function ofc there is another method. But thx for tool. There are other functions that can load scripts, not just that. You can get rid of the problem by playing a bit with python and client source. Link to comment Share on other sites More sharing options...
KoMaR1911 502 Posted May 1, 2020 Author Share Posted May 1, 2020 8 hours ago, tierrilopes said: There are other functions that can load scripts, not just that. You can get rid of the problem by playing a bit with python and client source. pyrun_simplestringflags is never used by game Link to comment Share on other sites More sharing options...
bowbow 0 Posted June 5, 2021 Share Posted June 5, 2021 Hello! ''PyRunSimpleStringFlagsDumperMetin2.dll'' this file is dowlanding as snl. I do not know how to inject. I only know to inject dll files. Could you help me please? Thanks. Link to comment Share on other sites More sharing options...
KoMaR1911 502 Posted September 16, 2021 Author Share Posted September 16, 2021 16.09.2021 Changelog: - Added Pattern Scanner - Adder support for Static linked python27.lib in .exe! This is the hidden content, please Sign In or Sign Up 38 1 1 2 1 1 12 1 18 Link to comment Share on other sites More sharing options...
KoMaR1911 502 Posted November 12, 2021 Author Share Posted November 12, 2021 (edited) Sometimes pattern is different (when someone use for example optimalization or different compiler than visual studio) 1. Start IDA Pro then install Sig Maker to IDA Pro 2. check how PyRun_SimpleStringFlags looks for example on github This is the hidden content, please Sign In or Sign Up as you can see function PyRun_SimpleStringFlags have string "__main__" and 1 function upper (PyRun_SimpleFileExFlags) "python: Can't reopen .pyc file\n" 3. find "python: Can't reopen .pyc file\n" 4. skip this function and go to next function new functions in 90% starts with PUSH ebp MOV ebp, esp (i know sometimes its different but im trying to explain it for newbies only!!!) 5. if next functions have string "__main__" probably its your PyRun_SimpleStringFlags 6. Make new pattern and paste it to source i dont know how to explain it better for people who don't have any experience with Reverse Engineering so if you have any questions how to do it just ask Edited August 17, 2022 by Metin2 Dev Core X - External 2 Internal 26 1 1 1 1 1 11 3 17 Link to comment Share on other sites More sharing options...
Neyprz 0 Posted January 10, 2022 Share Posted January 10, 2022 Thanks, now I know how to use Link to comment Share on other sites More sharing options...
Recommended Posts