Keystroke loggers and spy software / hardware


As part of a penetration testing, there is a time and place for keystroke loggers. As part of a security or audit teams, you may need keyloggers should someone be suspected of illegal or inappropriate use of company resources. Parents sometimes place these on home machines to “monitor” what their underage children surf or email. Spouses also snoop on partners.

My focus is supporting network and PC admins. Be aware that this exists. Physical security is appropriate for workstations with confidential info. Consider reviewing how secure your CEO, CIO, legal officer, owner, .. PC really is. Could anyone walk up after hours and install one of these jewels? What about the hardware versions that only require physical access?

If there is a site that should be listed here or if a link goes dead, please let us know.


  • Anti-loggers
    Keystroke Loggers / Spy software:

    • PAL KeyLogPro & PC Spy : invisible and easy-to-use surveillance tool
      PAL KeyLogPro records every keystroke to a report file. It also monitors Internet activity by logging the addresses of visited homepages and can be used to filter harmful and inappropriate content.

      • monitors time and title of any active application; even text in edit boxes is captured.
      • records everything typed, including emails, instant messages, chats, and website addresses into a report file
      • monitor any programs used
      • includes a Internet filter and Banned websites functionality
      • password protected and special Hot Key to invoke program

      PAL PC Spy is a completely invisible Keyboard Recorder, Web Filter and Screen Capture utility that secretly captures anything the user sees or types on the keyboard! PAL PC Spy operates in stealth mode so that users are unaware of its existence. If, for some reason, they discovered that it was running, they would be unable to terminate the programme!


      • Monitor Chat Room and Web Activity
      • Monitor any Email and Programs used
      • Monitor Children’s activities on your Computer / Web
      • Monitor Employees or counter monitor employers
      • Password Protected and special Hot Key to invoke program
      • Monitors across networks
      • Monitor by user


    • Perfect Keylogger : advanced monitoring and surveilance
      key logger, screen logger, website logging, remote surveillance, supports log emailing, FTP etc

    • PC Activity Monitors
      Invisible keylogger software that captures all users activity (all typed keystrokes and passwords, chat conversations, visited web-sites urls, opened windows etc…) All received during monitoring process data is stored to encrypted log-file. Later you can review all activity of any users on your computer

    • keystroke logger for Windows NT / 2000
      NT/W2K, free

    • ComLog.pl, a WIN32 command prompt logger
      Perl tool to monitor DOS sessions on Windows NT/2K

    • Ghost Keylogger
      software that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. also logs the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. Windows 95 / 98 / ME / NT / 2000 / XP compatible

    • Hardware keystroke logger

    • Invisible KeyLogger Stealth for Windows 2000/XP
      Win2K/XP kernel-mode driver which runs silently at the lowest level of Windows 2000/XP operating system. All keystrokes are recorded, including the alt-ctrl-del trusted logon and keystrokes into a DOS box or Java chat room.
    • keykey 2000 (shareware)

    • keystroke loggers registry tip

    • Keyboard Monitor

    • Spector and eBlaster Spy Software

    • SpyAgent
      Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat conversations, and even screenshots. Perfect for monitoring others who use your PC – children, spouses, employees, or just yourself!

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top