Like us on facebook and stay updated! Click here


Featured Video

Sunday 11 March 2012

Keylogger - collection



Keystroke logging (often called keylogging) is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for law enforcement and espionage—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others.

Writing software applications for keylogging is trivial, and like any computer program can be distributed as a trojan horse or as part of a virus. What is not trivial however, is installing a keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.

lets see some of the key logger's

Local Keylogger Pro 3.1 - Local Keylogger Pro allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Local Keylogger Pro makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones. Local Keylogger Pro can record all user activity to the log file. This information can be exported to HTML for convenient viewing in your web browser, or exported to MHT file for analysis. This allows you to see how long users worked with particular programs, how much time they spent on Internet, what sites they visited, what they typed in e-mails or chats.[Download][Crack]

XP Advanced Keylogger 2.5 - XP Advanced Keylogger is a top-rated invisible easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. It can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.{Windows 95, NT4, 98, Me, 2000, XP} [Download][Crack]

Blazing Tools Perfect Keylogger 1.67 - Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings.

Perfect Keylogger is an extremely compact, award-winning tool. It is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list.

Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.
Perfect Keylogger was the first keylogging software solution which can be absolutely invisible in the Windows NT/2000/XP/Vista Task Manager![Download][Crack]

SC Keylogger Pro V3.2 - A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.[Download]

Hook Keylogger v2.1 - Small and stealth keylogger without an installer; simplest keylogger possible Specify log file location Uses a WH_JOURNALRECORD hooking procedure to capture everything typed Hide and unhide the interface by pressing Ctrl+Shift+F7 [Download][Crack]

Advanced Invisible Keylogger 1.8 - Advanced Invisible Keylogger is an stealth spy tool, the best spy software offered by ToolAnywhere! Advanced Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords.

Advanced Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM.

All Desktop activity will be recorded through Advanced Invisible Keylogger’s secret! Have reports sent to your email address at anytime secretly! Advanced Invisible Keylogger is so stealthy and hides so well that not even a computer technician with years of experience can detect it running!

The most powerful stealth program at a most affordable price! An easy-to-use stealth solution for PC and Internet surveillance. Purchase your copy today and feel safe and secure.[Download]


KLG: Download

Type: Keylogger
A Plus: Download
Type: Keylogger
Curiosity: Download
Type: Keylogger
This keylogger will store all keystrokes in

C:\windows\KeyLogs.txt
Elitek3yl0gg3r10: Download
Type: Keylogger
1)No Process Visible in any Task manager,Process explorer(2k,xp,9x)
2)Injects into Explorer.exe on startup and exiting the parent.
3)Firewall bypassing by injecting code into IE and sending mail
4)Invisible Startup, will not show in msconfig,autorun.exe (sysinternals)
5)Automatic Uninstall
6)Protucted Storage ,Cashed Passwords sender
7)No need ur own SMTP server(sending directly) to MX.
8)Remote Installer,Uninstaller
9)Built in Binder makes the keylogger same as the binded EXE(Icon,Version)
0)HTML formatted logs
11)Detect ICQ/MSN/AOL/Yahoo Chats.
12)Logging Window names,All keys typed in that window.
13)EXE Size is 12.7 KB
FKS: Download
Type: Keylogger
Fearless Keyspy v2.0 has a very small (2.5 KB) assembly server,
with a low memory usage.
New features include a "webget" feature, a better GUI and lots of
deeper server and editor improvements
FKWP20: Download
Type: Keylogger
1)logging all keystrokes
2) Download 2 urls cab files and extracting and executing the inside exes (Firewall bypass)
3) Protected storage (Outlook, IE stored passes),Cashed Dialup passes Sender
4) keystrokes ,passes will mail to the email id,daily or the log size is over
5) firewall bypassing by injecting code into IE and sending mail
6) No Process visible ,injects into Explorer.exe on startup and exiting
7) Active Setup Startup
8) EXE size is 11.9 KB
9) encrypted log file
10) File manager for controlling remote system
K3Yl0G3R: Download
Type: Keylogger
For more hacking tools , warez , full appz , ip scanners and tons
of direct illegal downloads at http://www.openpc.co.nr
Key Copy: Download
Type: Keylogger
You use KEYCOPY to keep a record of any keyboard activity on your computer.
This includes usage in Wordperfect 5.0,Multimate,Norton Editor. Keycopy copy's
each keystroke to a buffer within the KEYCOPY program area. When the keycopy
buffer has 200 keystrokes in memory, keycopy will copy the buffer to a file
with a date and time stamp. The file default is c:\keycopy. You can specify
drive,subdirectory and file name by having the parameter file called KC.PRM
in the subdirectory where KEYCOPY is executed from. If you change the KC.PRM
file and want the change to take effect with keycopy. The computer will have
to be rebooted, and Keycopy executed again. Keycopy has been tested and used
with DOS 3.3 and 4.0 and uses less than 3k of memory.
skl01: Download
Type: Keylogger
1)Targetted keylogging(logs only the keys from the specifyed windows)
2)keystrokes will mail to the email id,daily or the log size is over
3)firewall bypassing by injecting code into IE and sending mail
4) Deleting all Cookies at installation.
5) EXE size is 8.5kb
6) we can create  our own keylogger using the editor,we can specify the window titiles (the keys need to log),our email id,smtp server,log size)

0 comments:

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More