Screenshare checks,
backed by data
Shaher collects BAM, Prefetch, memory-backed paths, DNS cache, signatures, and other host signals—then ships one report per scan to your dashboard.
What the scanner pulls
Built for FiveM / PC screenshare workflows: one binary, many artifact sources, one structured report.
Host artifacts
BAM, Prefetch, PcaSvc, DiagTrack, AppInfo, selected registry hives—queried in one pass.
Memory-backed strings
Reads from PcaSvc, DiagTrack, DNS cache, and LSASS where configured—useful for domains and paths that never hit disk cleanly.
Code signing
Authenticode / catalog checks on binaries we surface, plus flags for mismatched or suspicious signatures.
PINs & sessions
Each run is keyed with a disposable PIN or session id. Reports land only on the owning license.
USB history
Lists storage devices seen by Windows with first/last attach times when the OS recorded them.
Dashboard
Scan list, simple charts, and detection tags so staff can compare machines without digging through raw logs.
How a scan runs
Staff issues a link; the player runs the exe; you read the report online.
Account & license
Register, sign in, paste the license you were given.
New session
From the dashboard, create a session and copy the download link.
On the target PC
They download ShaherScan, run as admin, enter the code when asked.
Report
The upload attaches to your license; open it from Scan history when it appears.
Plans
Pick what fits your server size; upgrade if volume grows.
Quick reference
Login · Dashboard · New session · Send link · Player runs ShaherScan · Report shows under your license.
Access
Use Login or Sign up in the header. The dashboard loads after authentication.
Dashboard
Enter the license key if prompted, then use New session to mint a link and code.
Scan & report
Pass the link to the person being checked. When the upload finishes, the scan row appears—open it for the full HTML report.
Frequently Asked Questions
Why Shaher?
It automates the boring part of a screenshare: artifact dumps, signing checks, and cheat/threat string hits in one report.
Supported OS
Windows 7 through 11. Admin rights are required so the collector can read protected locations.
Where are my scans?
Dashboard → Scan history. Each row opens the report for that machine in a new tab.
Need an account?
Sign up, drop in your license, and issue the first session in a few minutes.
Get Started