You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Provides some general information about how to go about making a LiveSplit auto splitter.
Resources to learn making very simple Auto Splitters
Preamble: this should not be attempted with online games or games which have an anti cheat in place, it could result in permanent bans.
Learn how to use Cheat Engine
The Cheat Engine section in the #tutorials channel in the Speedrun Tool Development Discord server has a few tutorials and guides. It is recommended to also do the Cheat Engine tutorial when the software is first launched. The Cheat Engine wiki and forums also have more resources.
Cheat Engine is usually used to find health or money addresses to edit their values. Those addresses will be the information your auto splitter will depend on for everything it does.
Should the goal be to split upon level changes, searching for an index (often int (4 Bytes)) or a name (string) can yield good results. For lo
An example class for developers to put into their games to make life of ASL creators easier.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
GitHub Search Syntax for Finding API Keys/Secrets/Tokens
As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.
Search Syntax:
(path:*.{File_extension1} OR path:*.{File_extension-N}) AND ({Keyname1} OR {Keyname-N}) AND (({Signature/pattern1} OR {Signature/pattern-N}) AND ({PlatformTag1} OR {PlatformTag-N}))