Documentation

Everything you need to know about ClubhouseAC - the most comprehensive forensic anti-cheat scanner available.

1,690+
Detection Methods
25
Detection Categories
100%
Read-Only Scan
<60s
Scan Time

What We Detect

Our scanner performs over 1,690 forensic checks across 25 detection categories. Industry-leading coverage built on advanced digital forensics techniques.

Memory Forensics
151

Deep memory analysis including process injection, hook detection, and kernel-level forensics

RWX Memory RegionsIAT/EAT Hook DetectionThread Injection Analysis+2 more
File System Forensics
118

NTFS forensics, MFT analysis, and deleted file recovery techniques

MFT Record AnalysisUSN Journal Parsing$LogFile Recovery+2 more
Execution Artifacts
114

Complete execution history analysis across all Windows artifact sources

Prefetch AnalysisShimcache ParsingAmcache Forensics+2 more
Cleaner Tool Detection
110

Detection of evidence destruction tools and cleanup utilities

CCleaner/BleachBit TracesRegistry Cleaner DetectionEvent Log Tampering+2 more
Registry Forensics
107

Deep Windows registry analysis and artifact recovery

UserAssist DecodingShellbag AnalysisMRU List Parsing+2 more
HWID Spoofer Detection
100

Hardware ID spoofing and manipulation detection across all system identifiers

Disk Serial VerificationMAC Address ValidationSMBIOS Integrity Check+2 more
Anti-Forensics Detection
100

Detection of evidence hiding, tampering, and anti-forensic techniques

Timestomping DetectionSecure Wipe DetectionLog Manipulation+2 more
Behavioral Analysis
71

Pattern recognition and anomaly detection across system activity

Usage Pattern AnalysisTimeline CorrelationActivity Gap Detection+2 more
Kernel/Driver Forensics
62

Kernel-level analysis including driver integrity and rootkit detection

Driver Signature VerificationKernel Hook DetectionSSDT Analysis+2 more
Browser Forensics
61

Comprehensive browser artifact analysis across all major browsers

History RecoveryDownload AnalysisCookie Forensics+2 more
DMA Hardware Detection
60

PCIe DMA card and FPGA-based cheat hardware detection

PCIe Device EnumerationFPGA Signature DetectionFirmware Artifact Analysis+2 more
Hardware Integrity
60

Hardware configuration verification and tampering detection

Component VerificationSerial Consistency ChecksConfiguration Validation+2 more
Memory/Process Analysis
60

Process memory forensics and code injection detection

Process Hollowing DetectionDLL Injection AnalysisCode Cave Detection+2 more
Firmware/UEFI Analysis
60

Low-level firmware analysis and bootkit detection

UEFI Variable AnalysisSecure Boot VerificationSPI Flash Analysis+2 more
Timestamp Analysis
50

Temporal correlation and timestamp manipulation detection

MACB Time Analysis$SI vs $FN ComparisonTimestamp Anomalies+2 more
Evidence Correlation
50

Cross-artifact correlation and pattern recognition

Multi-Source CorrelationTimeline ReconstructionEvidence Linking+2 more
Reporting & Evidence
50

Evidence collection, validation, and report generation

Evidence PackagingHash VerificationChain of Custody+2 more
Network Forensics
42

Network connection analysis and communication forensics

Connection HistoryDNS Cache AnalysisProxy Detection+2 more
Fuser/Capture Detection
40

HDMI splitter, capture card, and display fusion detection

EDID AnalysisCapture Card DetectionVirtual Display Detection+2 more
Virtualization Detection
37

Virtual machine and sandbox environment detection

VM Artifact DetectionHypervisor DetectionSandbox Indicators+2 more
Peripheral Forensics
20

Input device and peripheral analysis

USB Device HistoryHID AnalysisDevice Enumeration+2 more
Fileless Bypass Detection
50

Detect memory-only cheats, LOLBins abuse, and evasion techniques that leave no files

PowerShell AbuseWMI PersistenceLOLBins Execution+2 more
Gaming Platform Analysis
8

Steam, Epic, and game client forensics

Steam ArtifactsEpic Games AnalysisGame Cache Analysis+2 more
Cloud Sync Forensics
7

Cloud storage and synchronization service analysis

Cloud Cache AnalysisSync HistoryDeleted File Recovery+2 more
PC Swap Detection
100

Detect when users run scans on secondary/clean PCs instead of their main gaming PC

WiFi History AnalysisARP Table ForensicsNetwork Adapter WMI+2 more
1,696 Total Detection Methods

Continuously updated with new detection signatures. Our forensic engine leaves no trace unexamined.

How to Use

Getting started is straightforward. Here's the process from start to finish.

1

Get your scanner link

After purchasing, you'll receive a unique download link for your server's scanner. This links all scans back to your dashboard.

2

Send to suspect

When you suspect a player, DM them the scanner link. The scanner is a small executable that runs without admin rights.

3

Player runs scan

The player downloads and runs the scanner. It takes 30-60 seconds and automatically uploads results to your dashboard.

4

Review results

Check your dashboard for the scan results. Click on any scan to see detailed findings, file paths, timestamps, and severity levels.

5

Take action

Based on the findings, decide whether to clear the player or take action. Export reports for ban appeals or evidence.

Frequently Asked Questions

Common questions from server owners and staff.

Is the scanner safe for players to run?

Yes. The scanner is 100% read-only and doesn't modify any files on the player's system. It performs forensic analysis of system artifacts and securely uploads results to your dashboard.

How comprehensive is the detection coverage?

Our scanner performs 1,690+ forensic checks across 25 categories including memory forensics, file system analysis, registry forensics, hardware integrity verification, and more. It's the most comprehensive anti-cheat scanner available.

Can cheaters bypass the scan?

We have 110+ specific detections for cleaner tools, 100+ anti-forensics checks, and advanced artifact recovery that can find traces even after deletion attempts. Cleanup attempts themselves leave forensic evidence.

How long does a scan take?

Most scans complete in 30-60 seconds. Our scanner is optimized for speed while performing deep forensic analysis across all 25 detection categories.

What about DMA/hardware cheats?

We have 60 dedicated DMA hardware detection methods covering PCIe enumeration, FPGA signatures, firmware artifacts, and memory analysis. Plus 40 fuser/capture device detections.

What if a detection is wrong?

We maintain a very low false positive rate through forensic validation. Each detection includes full context - file paths, timestamps, and severity levels - so you can verify findings.

Do you detect HWID spoofers?

Yes. We have 100 dedicated HWID spoofer detection methods covering disk serials, MAC addresses, SMBIOS data, GPU IDs, TPM attestation, and more. We cross-validate multiple data sources to detect inconsistencies.

How often are detections updated?

Our detection signatures are continuously updated to cover new cheats, bypasses, and evasion techniques. The current database includes 1,690+ detection methods.

Ready to protect your server?

Get access to 1,690+ forensic detection methods across 25 categories. The most comprehensive anti-cheat scanner available.

Get Started