DOWNLOAD FREE 10 BEST FREE KEYLOGGERS
MANY OF YOU MUST BE KNOWING BUT MANY OF YOU DON'T KNOW THAT WHAT IS A KEYLOGGER SO FIRST OF ALL I AM GOING TO TELL YOU THAT WHAT IS A KEYLOGGER
Software-based keyloggers

- Hypervisor-based: The keylogger can theoretically reside in a malware hypervisor running underneath the operating system, which remains untouched. It effectively becomes a virtual machine. Blue Pill is a conceptual example.
- Kernel-based: This method is difficult both to write and to combat. Such keyloggers reside at the kernel level and are thus difficult to detect, especially for user-mode applications. They are frequently implemented as rootkits that subvert the operating system kernel and gain unauthorized access to the hardware, making them very powerful. A keylogger using this method can act as a keyboard device driver for example, and thus gain access to any information typed on the keyboard as it goes to the operating system.
- API-based: These keyloggers hook keyboard APIs;
the operating system then notifies the keylogger each time a key is
pressed and the keylogger simply records it. Windows APIs such as
GetAsyncKeyState()
,GetForegroundWindow()
, etc. are used to poll the state of the keyboard or to subscribe to keyboard events. These types of keyloggers are the easiest to write, but where constant polling of each key is required, they can cause a noticeable increase in CPU usage, and can also miss the occasional key. A more recent example simply polls the BIOS for pre-boot authentication PINs that have not been cleared from memory. - Form grabbing based: Form grabbing-based keyloggers log web form submissions by recording the web browsing onsubmit event functions. This records form data before it is passed over the Internet and bypasses HTTPS encryption.
- Memory injection based: Memory Injection (MitB)-based keyloggers alter memory tables associated with the browser and other system functions to perform their logging functions. By patching the memory tables or injecting directly into memory, this technique can be used by malware authors who are looking to bypass Windows UAC (User Account Control). The Zeus and Spyeye Trojans use this method exclusively.
- Packet analyzers: This involves capturing network traffic associated with HTTP POST events to retrieve unencrypted passwords.
- Data is uploaded to a website, database or an FTP server.
- Data is periodically emailed to a pre-defined email address.
- Data is wirelessly transmitted by means of an attached hardware system.
- The software enables a remote login to the local machine from the Internet or the local network, for data logs stored on the target machine to be accessed.
Hardware-based keyloggers
Main article: Hardware keylogger
Hardware-based keyloggers do not depend upon any software being
installed as they exist at a hardware level in a computer system.- Firmware-based: BIOS-level firmware that handles keyboard events can be modified to record these events as they are processed. Physical and/or root-level access is required to the machine, and the software loaded into the BIOS needs to be created for the specific hardware that it will be running on.
- Keyboard hardware: Hardware keyloggers are used for keystroke logging by means of a hardware circuit that is attached somewhere in between the computer keyboard and the computer, typically inline with the keyboard's cable connector. More stealthy implementations can be installed or built into standard keyboards, so that no device is visible on the external cable. Both types log all keyboard activity to their internal memory, which can be subsequently accessed, for example, by typing in a secret key sequence. A hardware keylogger has an advantage over a software solution: it is not dependent on being installed on the target computer's operating system and therefore will not interfere with any program running on the target machine or be detected by any software. However its physical presence may be detected if, for example, it is installed outside the case as an inline device between the computer and the keyboard. Some of these implementations have the ability to be controlled and monitored remotely by means of a wireless communication standard.
- Wireless keyboard sniffers: These passive sniffers collect packets of data being transferred from a wireless keyboard and its receiver. As encryption may be used to secure the wireless communications between the two devices, this may need to be cracked beforehand if the transmissions are to be read.
- Keyboard overlays: Criminals have been known to use keyboard overlays on ATMs to capture people's PINs. Each keypress is registered by the keyboard of the ATM as well as the criminal's keypad that is placed over it. The device is designed to look like an integrated part of the machine so that bank customers are unaware of its presence.
- Acoustic keyloggers: Acoustic cryptanalysis can be used to monitor the sound created by someone typing on a computer. Each key on the keyboard makes a subtly different acoustic signature when struck. It is then possible to identify which keystroke signature relates to which keyboard character via statistical methods such as frequency analysis. The repetition frequency of similar acoustic keystroke signatures, the timings between different keyboard strokes and other context information such as the probable language in which the user is writing are used in this analysis to map sounds to letters. A fairly long recording (1000 or more keystrokes) is required so that a big enough sample is collected.
- Electromagnetic emissions: It is possible to capture the electromagnetic emissions of a wired keyboard from up to 20 metres (66 ft) away, without being physically wired to it. In 2009, Swiss researches tested 11 different USB, PS/2 and laptop keyboards in a semi-anechoic chamber and found them all vulnerable, primarily because of the prohibitive cost of adding shielding during manufacture. The researchers used a wide-band receiver to tune into the specific frequency of the emissions radiated from the keyboards.
- Optical surveillance: Optical surveillance, while not a keylogger in the classical sense, is nonetheless an approach that can be used to capture passwords or PINs. A strategically placed camera, such as a hidden surveillance camera at an ATM, can allow a criminal to watch a PIN or password being entered.
- Physical evidence: For a keypad that is used only to enter a security code, the keys which are in actual use will have evidence of use from many fingerprints. A passcode of four digits, if the four digits in question are known, is reduced from 10,000 possibilities to just 24 possibilities. These could then be used on separate occasions for a manual "brute force attack."
Anti keyloggers
Main article: Anti keylogger
An anti keylogger is a piece of software
specifically designed to detect keyloggers on a computer, typically
comparing all files in the computer against a database of keyloggers
looking for similarities which might signal the presence of a hidden
keylogger. As anti keyloggers have been designed specifically to detect
keyloggers, they have the potential to be more effective than
conventional anti virus software; some anti virus software do not
consider certain keyloggers a virus, as under some circumstances a
keylogger can be considered a legitimate piece of softwareOne-time passwords (OTP)
Using one-time passwords may be keylogger-safe, as each password is invalidated as soon as it's used. This solution may be useful for someone using a public computer, however an attacker who has remote control over such a computer can simply wait for the victim to enter his/her credentials before performing unauthorised transactions on their behalf while their session is active.NOW THE KEYLOGGERS TO DOWNLOAD FOR FREE
1. REFOG Free Edition
Refog Free Keylogger
beats competition in two respects: it’s simple to use and it’s free. REFOG Free
Keylogger can look after your children without them even noticing. Even
technically minded children won’t detect the key logger when it runs in a
stealth mode. The program removes all the shortcuts and can be accessed only
through a hot key combination. Running unobtrusively from the moment the system
boots, REFOG Free Keylogger keeps track of all typed or pasted text.
2. Black box express [BEST ACCORDING TO ME]
Simple to use monitoring
of one local computer; Monitor Screen recordings, Programs, Keystrokes typed, Websites,
Web Searches, Emails/Webmails/ Instant Messenger Chat sent and received. Alerts
and Warnings instantly or as a summary on your e-mail or cell phone. everything
for 100% Free. No strings attached.
3. Personal keylogger [EASY TO USE]
The Personal Keylogger
application was designed to be a small tool that will allow you to secretly
record all keystrokes and other input. All specific instructions are explained
in the application. To exit it and receive your logs, you will need to enter in
your keycode. If you have forgotten your keycode, you will need to restart the
computer. Keycode is like password. To stop Personal keylogger, you can enter
your keycode anywhere on the screen. Once you type-in your keycode, the
keylogger will stop monitoring and the log.txt file will be created in your
selected destination folder.
4. Py keylogger
PyKeylogger is an
easy-to-use and simple keylogger written in python. It is primarily designed
for backup purposes, but can be used as a stealth keylogger, too. It does not
raise any trust issues, since it is a short python script that you can easily
examine. It is primarily designed for personal backup purposes, rather than
stealth keylogging. Thus, it does not make explicit attempts to hide its
presence from the operating system or the user. That said, the only way it is
visible is that the process name shows up in the task list, so it is not immediately apparent that there is a keylogger on the system.
Download
Download
5. Heretic Macro
Heretic is a powerful
tool that is able to record user events, such as mouse clicks and keys, into a
C/Java-like script, and play that script either once or repeatedly. It has many
commands for dynamic pixel-based botting, window based botting, and static
botting/macro-ing (i.e. key presses, mouse clicks, mouse moves, and pauses).
6. Ultimate Keylogger
Ultimate Keylogger Free
is a free popular all-round monitoring solution. It runs in the background and
monitors all typed keystrokes, applications, passwords, clipboard, email, and
visited websites’ URLs. You can view the reports as HTML files. Ultimate
Keylogger Free will help you to find out, what exactly took place in the
system.
7. Actual keylogger
It runs hidden in the
background and automatically records all keystrokes (including Alt, Ctrl and
other functional buttons). The interface can be password protected and the log
files are encrypted. You can view the reports as HTML or plain text. In the
hidden mode it is invisible in all operating systems.
8. Revealer Keylogger Free Edition
Revealer Keylogger is
surely the easiest and faster way to record keyboard inputs. There is almost
nothing to configure, in fact everything is configured internally with the best
settings. Free keylogger monitoring tool that logs every keystroke even
passwords behind asterisks and conversations in common instant messengers. Its
interface is password protected, the software does not appear in Add/Remove
programs or in the taskbar.
9. Romaco Keylogger
Romaco Keylogger is a
small and easy to use tool that can log all key-presses that are made while it
is running, and display them to you in its window. It automatically exports the
logged text to a text file every 5 minutes, or manually. It can be hidden at
the click of a button, and recalled by vigorously pressing one of the least
used keys on the keyboard, the break key.
10. KidLogger
KidLogger collects user
activity journal on the Computer and creates detailed Analysis of the user
activity available online. Creates the list of most used web sites. Record the
text was typed on the keyboard in any application
No comments:
Post a Comment