[go: up one dir, main page]

Browse free open source Keyloggers and projects below. Use the toggles on the left to filter open source Keyloggers by OS, license, language, programming language, and project status.

  • One Platform. Total IT Insight. Start with PRTG Now Icon
    One Platform. Total IT Insight. Start with PRTG Now

    Rely on a single source of truth. PRTG unifies monitoring for all your systems, apps, and services.

    Why settle for fragmented monitoring? PRTG consolidates everything - servers, VMs, network devices, cloud services, and more, into one powerful platform. Get real-time status, customizable alerts, and deep analytics to drive smarter decisions. Designed for complex environments, PRTG scales with your needs, supports team collaboration, and helps you prevent outages before they impact users. Take control of your IT landscape and deliver the uptime your business requires.
    Start Your Free PRTG Trial
  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
    Sign up
  • 1

    Keylogger

    A simple keylogger for Windows, Linux and Mac

    Keylogger is a simple keystroke logger for Windows, Mac and Linux. A keystroke logger or keylogger is basically a program that records keystrokes and saves them in a log file on your local computer. This keylogger is simple and bare bones, but works wonderfully and is useful for a number of things. You can use it to track key movements and make sure no one is using your computer while you’re away, or use it for self-analysis. In businesses and offices it can be used to monitor employee activity; in schools it can track keystrokes and log banned words.
    Downloads: 76 This Week
    Last Update:
    See Project
  • 2

    spyware

    A complete SpyWare.

    A complete local and configurable spyware. This spyware is a python package compiled for Windows. This spyware is not a virus, it does not export any data to a server. Data is stored locally only. Do not use it for illegal purposes. - Save keyboard events - Record from microphone - Save files metadata in CSV file - Screenshots - Pictures from Webcam - Domains and IP addresses from metadata - Save clipboard
    Downloads: 59 This Week
    Last Update:
    See Project
  • 3
    This project is to develop an installer package for a python key logger I modified for stealth use It will be packaged with NSIS for distribution on portableapps.com and elsewhere. it will fit on a usb key and provide quick and easy key logging on the go
    Downloads: 19 This Week
    Last Update:
    See Project
  • 4
    A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
    Downloads: 7 This Week
    Last Update:
    See Project
  • Cloud data warehouse to power your data-driven innovation Icon
    Cloud data warehouse to power your data-driven innovation

    BigQuery is a serverless and cost-effective enterprise data warehouse that works across clouds and scales with your data.

    BigQuery Studio provides a single, unified interface for all data practitioners of various coding skills to simplify analytics workflows from data ingestion and preparation to data exploration and visualization to ML model creation and use. It also allows you to use simple SQL to access Vertex AI foundational models directly inside BigQuery for text processing tasks, such as sentiment analysis, entity extraction, and many more without having to deal with specialized models.
    Try for free
  • 5
    KeyCounter is a tool for the tray-bar that helps you to get statistics about the useage of your computers keyboard, mouse and uptime. KeyCounter is not intended to work as a keylogger.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 6
    Basic Key Logger
    Non-stealth keylogger for Windows. Records mouse and keyboard (precision~10-15ms), log of events (disk size~2.5k/s) + log of operations (~ 0.2k/s). Standalone, with local copy of Python: unzip to install, delete to uninstall.NEW: hidden/visible icon
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Winhook Keylogger

    Winhook Keylogger

    Windows Hook Keylogger

    The Internet is full of such stuff. So why not introduce to you another one? Go! This is another example of using Win32 API functions to hook some system messages. Just run it once to start listening to the keyboard and clipboard and writing all content into a text log file. Recording will stop the second time you execute it. The author promises that this keylogger has no undeclared functions and is not a malicious program. It is intended for educational use and not for collecting sensitive information.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    ttyrpld is a multi-OS kernel-level TTY keylogger and screenlogger with (a)synchronous replay support. It runs on Linux, Solaris, FreeBSD, NetBSD and OpenBSD.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    LKL is a userspace keylogger that runs under Linux on the x86 arch. LKL logs everything that passes through the hardware keyboard port (0x60). It translates keycodes to ASCII with a keymap file.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 10
    Network Keylogger
    Network Keylogger is a program that sends every key pressed in a computer to another computer, via TCP/IP.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    An Open Source Key logger Created in Borland Delphi 7. Supports any Operaring System, and safest of it's kind. It's unique and untraceable, use it for anything you can imagine.
    Leader badge">
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12
    AcousticSoundboard

    AcousticSoundboard

    Free, easy to use, lightweight soundboard for Windows

    Acoustic Soundboard is a free, open source program for Windows which strives to be easy to use and lightweight. The main purpose is to conveniently play audio files to others while allowing the user to hear what is playing and still use their microphone normally. There is no installation required, simply unzip the contents wherever you like. On closing, the soundboard will automatically save the user's last devices, sounds, and hotkeys to a database file. View a demo video here https://www.youtube.com/watch?v=cPdncc-q1oM If you want others to hear your microphone and the sounds you play, you will first need to install a virtual audio cable such as this one: https://vb-audio.com/Cable/ IMPORTANT: Windows may warn you that this program contains a virus because it hooks the keyboard. Your data stays on your computer only. Please see the readme for more information.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    apps tracker

    apps tracker

    Computer monitoring & time tracking app

    apps tracker is all in one computer monitoring and time tracking solution. Some of the features are: activitiy logging, keystrokes capturing, screenshots, email reports, application blocking, file change monitoring ... UI is inspired by "Metro" design, built with WPF Requires Microsoft .NET framework v4.5 Download page includes a setup file for installing the app and the zip file as portable version where no installation is necessary
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    keysniffer

    keysniffer

    Linux kernel mode debugfs keylogger

    A Linux kernel module to grab keys pressed in the keyboard, or a keylogger. keysniffer was initially written with the US keyboard (and conforming laptops) in mind. By default it shows human-readable strings for the keys pressed. However, as keyboards evolved, more keys got added. So the module now supports a module parameter codes which shows the keycode shift_mask pair in hex (codes=1) or decimal (codes=2). You can lookup the keycodes in /usr/include/linux/input-event-codes.h. The keypress logs are recorded in debugfs as long as the module is loaded. Only root or sudoers can read the log. The module name has been camouflaged to blend-in with other kernel modules. You can, however, execute a script at shutdown or reboot (the procedure would be distro-specific) to save the keys to a file. DISCLAIMER: keysniffer is intended to track your own devices and NOT to trespass on others. The author has never used it to compromise any third-party device and is not responsible for any
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    The Best Keylogger

    The Best Keylogger

    The Best Keylogger software is a convenient utility.

    The Best Keylogger software is a convenient utility that lets you keep track of all activity or logs on your computer, either visibly or invisibly. Download and try All in One Keylogger free of charge and get full access to all product functions for a 3-day trial period. - http://www.thebestkeylogger.com
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    An opensource chrome javascript extension/user-script, that records key strokes in the browser, and sends them to an external listener, cannot be detected by any anti-virus at the moment. Written Completely in javascript and php.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17

    Cobrax trojan

    Cobrax Trojan - 1.0

    Troyano de conexion inversa desarrollado en C++ & Visual Basic 6.0, con codigo abierto.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18

    NimKeylogger

    Keylogger and saves keyboard events in a Keyboard Catpure file

    This nim script implements a keylogger and saves keyboard events in a Keyboard Catpure file.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    A USLESS KEYLOGGER |MZL

    A USLESS KEYLOGGER |MZL

    A keylogger that save your data with yourself and works

    A keylogger that save your data with yourself and works as backup of every text you write
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    AES Chipter

    AES Chipter (E-Posta şifreleme yazılımı)

    AES Chipter kişisel olarak gönderdiğiniz e-postaların meraklı kişiler tarafından izlenmesini engellemeyi amaçlayan bir sistemdir. Meraklı gözlerden bıktınızsa ya da bilgisayarınızdan gönderdiğiniz e-postaların başkası tarafından okunmasını istemiyorsanız AES Chipter tam size göredir. Kuruluma ihtiyaç duymaz, kullandıktan sonra silerek hiçbir iz bırakmadan anonim olarak şifreli e-posta göndermiş olursunuz. Sizin belirlediğiniz bir şifre ve konu başlığı adı altında çok uzun bir şifreli anahtarı da sizin şifreniz ile karıştırarak programda çok karmaşık bir şifre oluşturur. Bu sebeple siz kısa bir şifre bile yazsanız kendi oluşturduğu şifre sayesinde çok uzun ve karmaşık bir şifre anahtarı oluşturur. Bu işlem sayesinde bilgisayarınızda “keylogger” adı verilen tuş kaydetme yazılımları olsa bile, sadece şifrenizle iletiniz okunamayacaktır.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Activity Reporter

    The System Activity Logger is an special monitoring software to record

    This free surveillance software is a reliable tool which performs network monitoring through timed system tracking. Track computer activity of your employees remotely and ensure safe computing at workplace.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Adsocks

    Adsocks

    Administrador Remoto

    Herramienta de Administración Remota opensource escrito en Java. Nota: El creador de este herramienta no se hace responsable del mal uso que le puedan dar a esta herramienta.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Adzok Open

    Adzok Open

    Administrador Remoto

    Herramienta de Administración Remota opensource escrito en Java. Nota: El creador de este herramienta no se hace responsable del mal uso que le puedan dar a esta herramienta.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    keylogger VideoLogger espione msn orkut skype transmite a tela , microfone , webcam grava conversas do msn para posterior visualização
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next

Open Source Keyloggers Guide

Open source keyloggers are a type of software designed to monitor and record the actions that take place on a computer. They are similar to other types of tracking programs such as monitoring malware, but their primary purpose is to track keyboard input. Open source keyloggers can capture whatever the user types on their computer, including emails, chat messages, logins and passwords, and even banking information. This makes them an effective tool for gathering data from users without their knowledge or consent.

Because open source keyloggers are created using publicly available code or libraries, they can be distributed freely with little concern for copyright infringement. This also means that anyone can take the code and modify it according to their own needs or preferences without having to pay a licensing fee. As a result, many developers create custom versions of open source keyloggers by adding additional features not found in standard versions.

The downside to using open source keyloggers is that they often don't have the same level of sophistication as commercial products such as Keylogger Pro or Spector Pro. Because these kinds of software are designed for malicious purposes, such as stealing data, they tend to include notable features such as encryption for added security measures. Open source solutions usually lack these features because they weren't built with nefarious intent in mind.

However, despite this drawback there are some advantages associated with open source solutions over commercial ones; the biggest being cost savings (as no fees apply). Additionally, since third-party developers may contribute enhancements to existing versions, many users find that open source solutions offer more flexibility than commercial ones when it comes to customization and upgrades down the line. It's worth noting that since anyone has access to an open source program’s codebase there is always a risk of hidden vulnerabilities or backdoors being present which could represent safety issues if exploited by malicious actors.

In conclusion, open source keyloggers are a viable and cost-effective solution for those looking to track computer input without having to purchase a commercial product. However, due to their somewhat limited featureset compared to commercial options and security vulnerabilities, it is important for users to take appropriate precautions when installing such software on their systems.

Features Provided by Open Source Keyloggers

  • Stealth: Open source keyloggers are designed to be undetectable and not interfere with other programs running on the same computer. They may use special techniques to hide their presence, such as encryption or registry hiding.
  • Monitoring: Open source keyloggers can monitor all user activity on the system, including activities like website visits, program usage, and file access, allowing you to gain insights into users' behavior. This can also help you detect suspicious behavior from staff or family members, if needed.
  • Logging: Open source keyloggers record all user input, including email messages, chat conversations, login attempts and more. This allows employers and parents alike to review their user's online activity without having to install any extra software or manually search around a computer’s hard drive for evidence of wrongdoing.
  • Alerts & Notifications: Many open source keyloggers come with features that allow you to set up alerts when certain words appear in monitored data streams or when predetermined criteria is met. This way you can stay informed about any unwanted or malicious activity taking place on your system in real-time, if necessary.
  • Remote Access & Control: Open source keyloggers can also provide remote access capabilities so one can view logs from anywhere in the world if they have an internet connection. Some even feature management tools that let you control settings remotely as well (stopping/starting monitoring sessions for example).
  • Automation: Another beneficial feature of open source keyloggers is their ability to trigger certain actions based on predetermined conditions. These could include things like disabling certain ports, blocking IP addresses and so on. This allows one to maintain control over their system without needing to be there in person all the time.

Types of Open Source Keyloggers

  • Ghostpress: This type of open source keylogger is capable of capturing detailed data such as keystrokes, screenshots, clipboard and system data. It can also be used to monitor activities on the user’s computer.
  • Logkeys: This type of open source keylogger has a recording capability that allows it to capture all keystrokes entered into the keyboard including passwords, emails and search terms. Additionally, this program is designed with stealth mode capabilities so that any changes made can not be detected without further investigation.
  • Revealer Keylogger Free Edition: This open source keylogger is designed with a built-in password recorder which enables it to discreetly record the information inputted into various applications and websites on a computer. It can also inform users when specific programs are opened or when certain keywords are entered in order to alert them of suspicious activities.
  • Spyrix Free Keylogger: This free version of Spyrix includes features such as recording typed text entries, emails sent and received, browsing histories and conversations in IM/VOIP programs. Its full version also provides a remote monitoring function which allows users to view logs from a remote location via their personal computer or mobile device.
  • Iwantsoft Free KeyLogger: This free edition offers an automatic start up feature which allows the program to run completely invisible in the background while still logging all user activity on the device it’s installed on. Additionally, its advanced security settings enable users to customize what will be monitored as well as set restrictions for certain applications and websites in order protect sensitive information from being compromised.
  • Elite Keylogger: This open source keylogger is detailed in its logging capabilities as it can record nearly every action a user takes on their computer including program usage, website visits and chat conversations. Additionally, it has the ability to capture screenshots of the computer’s activity which can provide valuable insight into what occurred during certain periods.
  • BlackBox Express: This open source keylogger offers several features to protect against unauthorized access and usage of the program. Its powerful encryption capabilities allow it to conceal its activity while still allowing users to gain detailed insight into their computer’s activity. Additionally, it is designed with stealth mode functions that can help keep its presence undetected from others.

Advantages of Using Open Source Keyloggers

Open source keyloggers are a great tool to have in any data security arsenal. Here are some of the benefits they provide:

  • Cost: Open source keyloggers are typically free or come with very low costs, meaning that anyone can access them without having to stretch their budget.
  • Customizable: Open sourcekeyloggers are fully customizable, allowing users to tailor their functionality and features to their specific needs. This includes accommodating changing hardware requirements or tweaking the code to suit the organization’s particular need.
  • Flexible: As open source software is always being developed, it allows for users to take advantage of updates and patches at no additional cost and as soon as they become available. This helps ensure that your security does not become outdated over time.
  • Secure: By leveraging existing open source code for keylogging rather than starting from scratch, organizations can reap the benefits of already established security protocols that maximize their data protection efforts.
  • Transparent: Since the source code is readily available whenever needed, organizations can quickly identify any potential vulnerabilities in their system so that those issues can be addressed quickly and securely before any damage arises.

Who Uses Open Source Keyloggers?

  • IT Professionals: IT professionals often use open source keyloggers for security purposes, such as tracking system activity and monitoring user input. They are likely to be well-versed in coding and able to customize the software to their needs.
  • Home Users: Home users may use open source keyloggers for a range of different reasons, from keeping a record of typed information, such as passwords or bank details, to parental control or simply monitoring computer usage.
  • Businesses: Businesses can take advantage of open source keyloggers to increase productivity and security across the network. For example, they can be used to track employee behavior on corporate networks and prevent data theft.
  • Hackers/Cybersecurity Researchers: Hackers/cybersecurity researchers may use open source keyloggers for testing the vulnerabilities of computers or networks by trying to access confidential information through typing it out on a monitored machine.
  • Government Agencies: Government agencies may use open source keyloggers for surveillance purposes related to national security issues, such as tracking down cybercriminals or terrorists.

How Much Do Open Source Keyloggers Cost?

Open source keyloggers can be obtained for free, as they are generally available in the public domain. However, if you want to use a more advanced version of an open source keylogger, it may be necessary to purchase a commercial product that is based on an open source codebase. These products will typically cost between $50 and $200, depending on the features they support and how easy they are to install and configure. Even then, there are some open source projects that offer feature-rich remote access keyloggers for no cost at all, making them a great option for those who don’t need or want to pay for an expensive commercial solution. Ultimately, the cost of a keylogger will depend on what features and capabilities are needed, and what type of technical expertise is available to properly install and configure the software.

What Software Can Integrate With Open Source Keyloggers?

Open source keyloggers can integrate with a variety of different software types, including but not limited to operating systems, web browsers, productivity suites, and more. Operating systems such as Linux and macOS provide support for open source keylogger integration through their included file system resources. Web browsers like Firefox also often make available extensions or plugins that allow users to add an open source keylogger platform while they browse the internet. Productivity suites like Microsoft Office typically provide facilities that allow users to include an open source keylogger in their documents, allowing them to capture data typed into spreadsheets or other files. Additionally, there are several mobile applications that can integrate with an open source keylogger on phones and tablets.

Trends Related to Open Source Keyloggers

  • Open source keyloggers have become increasingly popular over the last few years, as they provide a cost-effective way to capture user input on computers without any special hardware or software.
  • They can be used to track user activity and monitor computer performance, which is especially useful for businesses that want to keep an eye on their employees’ activities.
  • Open source keyloggers are also becoming increasingly powerful, with the ability to log keystrokes, take screenshots, and even record audio and video.
  • As open source keyloggers become more widely available, they are becoming easier to set up and use. This has led to a surge in popularity among users who are looking for an easy way to keep an eye on their computers.
  • The emergence of open source keyloggers has also led to a rise in sophisticated cyberattacks. These attacks can be used by hackers to gain access to sensitive information such as passwords and credit card numbers.
  • As open source keyloggers become more popular, security experts are recommending that users employ additional measures such as firewalls and antivirus software in order to protect their systems from these types of attacks.

How To Get Started With Open Source Keyloggers

Getting started with open source keyloggers is relatively easy and can be done in a few simple steps.

First, you will want to identify an appropriate open source logging application for your needs. There are many options out there, so do some research to find the best one for your situation. Be sure to check reviews from other users and determine what features the software offers that make it stand out. You may want to look into how secure it is as well since these programs record sensitive data, security should be top of mind.

Once you've found your logging program of choice, download it and install it on your computer or device. Depending on which platform you're using (Windows, MacOS, iOS, etc.), installation instructions may vary slightly. Refer to the documentation that comes bundled with the app, if necessary.

Next, configure the program according to your preferences and settings. With most applications this step involves adjusting basic settings such as frequency of logging or particular keystrokes which you wish log specifically. You can also specify any other parameters needed by selecting appropriate options in its setup wizard or interface tab, such as whether certain software applications should be excluded from logging activities or not, based on your needs and situation.

Finally, when everything is up and running properly execute the logging process itself by launching the application's Start command; then leave it going in background until all desired logs have been recorded through automatic scheduled intervals (usually customizable). To stop recording, just hit Stop button once again in application's interface menu when necessary–usually allowing recovered data files being exported quickly via copy-paste function at user's discretion thereafter too.

In conclusion, getting started with open source keyloggers is relatively straightforward. Just make sure to select the right program for your needs, install it properly and configure settings based on desired parameters then execute logging by launching Start command at appropriate time so that all information can be recorded accurately and securely as expected.