[go: up one dir, main page]

Browse free open source Keyloggers and projects below. Use the toggles on the left to filter open source Keyloggers by OS, license, language, programming language, and project status.

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • La version gratuite d'Auth0 s'enrichit ! Icon
    La version gratuite d'Auth0 s'enrichit !

    Gratuit pour 25 000 utilisateurs avec intégration Okta illimitée : concentrez-vous sur le développement de vos applications.

    Vous l'avez demandé, nous l'avons fait ! Les versions gratuite et payante d'Auth0 incluent des options qui vous permettent de développer, déployer et faire évoluer vos applications en toute sécurité. Utilisez Auth0 dès maintenant pour découvrir tous ses avantages.
    Essayez Auth0 gratuitement
  • 1

    Keylogger

    A simple keylogger for Windows, Linux and Mac

    Keylogger is a simple keystroke logger for Windows, Mac and Linux. A keystroke logger or keylogger is basically a program that records keystrokes and saves them in a log file on your local computer. This keylogger is simple and bare bones, but works wonderfully and is useful for a number of things. You can use it to track key movements and make sure no one is using your computer while you’re away, or use it for self-analysis. In businesses and offices it can be used to monitor employee activity; in schools it can track keystrokes and log banned words.
    Downloads: 74 This Week
    Last Update:
    See Project
  • 2
    A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
    Downloads: 163 This Week
    Last Update:
    See Project
  • 3

    spyware

    A complete SpyWare.

    A complete local and configurable spyware. This spyware is a python package compiled for Windows. This spyware is not a virus, it does not export any data to a server. Data is stored locally only. Do not use it for illegal purposes. - Save keyboard events - Record from microphone - Save files metadata in CSV file - Screenshots - Pictures from Webcam - Domains and IP addresses from metadata - Save clipboard
    Downloads: 41 This Week
    Last Update:
    See Project
  • 4
    KeyCounter is a tool for the tray-bar that helps you to get statistics about the useage of your computers keyboard, mouse and uptime. KeyCounter is not intended to work as a keylogger.
    Downloads: 9 This Week
    Last Update:
    See Project
  • The top-rated AI recruiting platform for faster, smarter hiring. Icon
    The top-rated AI recruiting platform for faster, smarter hiring.

    Humanly is an AI recruiting platform that automates candidate conversations, screening, and scheduling.

    Humanly is an AI-first recruiting platform that helps talent teams hire in days, not months—without adding headcount. Our intuitive CRM pairs with powerful agentic AI to engage and screen every candidate instantly, surfacing top talent fast. Built on insights from over 4 million candidate interactions, Humanly delivers speed, structure, and consistency at scale—engaging 100% of interested candidates and driving pipeline growth through targeted outreach and smart re-engagement. We integrate seamlessly with all major ATSs to reduce manual work, improve data flow, and enhance recruiter efficiency and candidate experience. Independent audits ensure our AI remains fair and bias-free, so you can hire confidently.
    Learn More
  • 5
    Basic Key Logger
    Non-stealth keylogger for Windows. Records mouse and keyboard (precision~10-15ms), log of events (disk size~2.5k/s) + log of operations (~ 0.2k/s). Standalone, with local copy of Python: unzip to install, delete to uninstall.NEW: hidden/visible icon
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    Winhook Keylogger

    Winhook Keylogger

    Windows Hook Keylogger

    The Internet is full of such stuff. So why not introduce to you another one? Go! This is another example of using Win32 API functions to hook some system messages. Just run it once to start listening to the keyboard and clipboard and writing all content into a text log file. Recording will stop the second time you execute it. The author promises that this keylogger has no undeclared functions and is not a malicious program. It is intended for educational use and not for collecting sensitive information.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    AcousticSoundboard

    AcousticSoundboard

    Free, easy to use, lightweight soundboard for Windows

    Acoustic Soundboard is a free, open source program for Windows which strives to be easy to use and lightweight. The main purpose is to conveniently play audio files to others while allowing the user to hear what is playing and still use their microphone normally. There is no installation required, simply unzip the contents wherever you like. On closing, the soundboard will automatically save the user's last devices, sounds, and hotkeys to a database file. View a demo video here https://www.youtube.com/watch?v=cPdncc-q1oM If you want others to hear your microphone and the sounds you play, you will first need to install a virtual audio cable such as this one: https://vb-audio.com/Cable/ IMPORTANT: Windows may warn you that this program contains a virus because it hooks the keyboard. Your data stays on your computer only. Please see the readme for more information.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    apps tracker

    apps tracker

    Computer monitoring & time tracking app

    apps tracker is all in one computer monitoring and time tracking solution. Some of the features are: activitiy logging, keystrokes capturing, screenshots, email reports, application blocking, file change monitoring ... UI is inspired by "Metro" design, built with WPF Requires Microsoft .NET framework v4.5 Download page includes a setup file for installing the app and the zip file as portable version where no installation is necessary
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    LKL is a userspace keylogger that runs under Linux on the x86 arch. LKL logs everything that passes through the hardware keyboard port (0x60). It translates keycodes to ASCII with a keymap file.
    Downloads: 1 This Week
    Last Update:
    See Project
  • The CRM you’ll want to use every day Icon
    The CRM you’ll want to use every day

    With CRM, Sales, and Marketing Automation in one, Act! gives you everything you need for happier clients, more revenue, and less stress.

    Act! Premium is perfect for small and midsize businesses looking to market better, sell more, and create customers for life. With unparalleled flexibility and freedom of choice, Act! Premium accommodates the unique ways you do business. Whether it’s customizations to fit your specific business or industry processes or your preferences for deployment and access, the possibilities with Act! Premium are limitless.
    Learn More
  • 10
    Network Keylogger
    Network Keylogger is a program that sends every key pressed in a computer to another computer, via TCP/IP.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    Strokey is a small hardware keyboard logger saving all keystrokes into an EEPROM memory for later investigation. The device may get attached to any PS/2-keyboard by intercepting the cable, or get placed directly inside for maximum invisibility.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    Keylogger Free
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Создавайте кейлогеры в удобной программе без знания кода.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    MyHook is a low resource, fast, reliable, key logger, with open source code. After 7 years and 30,000 downloads, we have decided to move this project to GitHub. Please visit us here: https://github.com/danamodio/myhook
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15

    NimKeylogger

    Keylogger and saves keyboard events in a Keyboard Catpure file

    This nim script implements a keylogger and saves keyboard events in a Keyboard Catpure file.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    keysniffer

    keysniffer

    Linux kernel mode debugfs keylogger

    A Linux kernel module to grab keys pressed in the keyboard, or a keylogger. keysniffer was initially written with the US keyboard (and conforming laptops) in mind. By default it shows human-readable strings for the keys pressed. However, as keyboards evolved, more keys got added. So the module now supports a module parameter codes which shows the keycode shift_mask pair in hex (codes=1) or decimal (codes=2). You can lookup the keycodes in /usr/include/linux/input-event-codes.h. The keypress logs are recorded in debugfs as long as the module is loaded. Only root or sudoers can read the log. The module name has been camouflaged to blend-in with other kernel modules. You can, however, execute a script at shutdown or reboot (the procedure would be distro-specific) to save the keys to a file. DISCLAIMER: keysniffer is intended to track your own devices and NOT to trespass on others. The author has never used it to compromise any third-party device and is not responsible for any
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    A USLESS KEYLOGGER |MZL

    A USLESS KEYLOGGER |MZL

    A keylogger that save your data with yourself and works

    A keylogger that save your data with yourself and works as backup of every text you write
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    AES Chipter

    AES Chipter (E-Posta şifreleme yazılımı)

    AES Chipter kişisel olarak gönderdiğiniz e-postaların meraklı kişiler tarafından izlenmesini engellemeyi amaçlayan bir sistemdir. Meraklı gözlerden bıktınızsa ya da bilgisayarınızdan gönderdiğiniz e-postaların başkası tarafından okunmasını istemiyorsanız AES Chipter tam size göredir. Kuruluma ihtiyaç duymaz, kullandıktan sonra silerek hiçbir iz bırakmadan anonim olarak şifreli e-posta göndermiş olursunuz. Sizin belirlediğiniz bir şifre ve konu başlığı adı altında çok uzun bir şifreli anahtarı da sizin şifreniz ile karıştırarak programda çok karmaşık bir şifre oluşturur. Bu sebeple siz kısa bir şifre bile yazsanız kendi oluşturduğu şifre sayesinde çok uzun ve karmaşık bir şifre anahtarı oluşturur. Bu işlem sayesinde bilgisayarınızda “keylogger” adı verilen tuş kaydetme yazılımları olsa bile, sadece şifrenizle iletiniz okunamayacaktır.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Activity Reporter

    The System Activity Logger is an special monitoring software to record

    This free surveillance software is a reliable tool which performs network monitoring through timed system tracking. Track computer activity of your employees remotely and ensure safe computing at workplace.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Adsocks

    Adsocks

    Administrador Remoto

    Herramienta de Administración Remota opensource escrito en Java. Nota: El creador de este herramienta no se hace responsable del mal uso que le puedan dar a esta herramienta.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Adzok Open

    Adzok Open

    Administrador Remoto

    Herramienta de Administración Remota opensource escrito en Java. Nota: El creador de este herramienta no se hace responsable del mal uso que le puedan dar a esta herramienta.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    keylogger VideoLogger espione msn orkut skype transmite a tela , microfone , webcam grava conversas do msn para posterior visualização
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Averia Keylogger(Beta) v0.5

    Averia Keylogger(Beta) v0.5

    Keylogger made in C++

    this is a keylogger made in C++ by watching tuts on how to do this, this is in the beta version and more updates will come up!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Camiel's Multi Tool
    dit is een Multi Tool die voral bedoelt is voor gebruik op voortgezet onderwijs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next

Open Source Keyloggers Guide

Open source keyloggers are a type of software designed to monitor and record the actions that take place on a computer. They are similar to other types of tracking programs such as monitoring malware, but their primary purpose is to track keyboard input. Open source keyloggers can capture whatever the user types on their computer, including emails, chat messages, logins and passwords, and even banking information. This makes them an effective tool for gathering data from users without their knowledge or consent.

Because open source keyloggers are created using publicly available code or libraries, they can be distributed freely with little concern for copyright infringement. This also means that anyone can take the code and modify it according to their own needs or preferences without having to pay a licensing fee. As a result, many developers create custom versions of open source keyloggers by adding additional features not found in standard versions.

The downside to using open source keyloggers is that they often don't have the same level of sophistication as commercial products such as Keylogger Pro or Spector Pro. Because these kinds of software are designed for malicious purposes, such as stealing data, they tend to include notable features such as encryption for added security measures. Open source solutions usually lack these features because they weren't built with nefarious intent in mind.

However, despite this drawback there are some advantages associated with open source solutions over commercial ones; the biggest being cost savings (as no fees apply). Additionally, since third-party developers may contribute enhancements to existing versions, many users find that open source solutions offer more flexibility than commercial ones when it comes to customization and upgrades down the line. It's worth noting that since anyone has access to an open source program’s codebase there is always a risk of hidden vulnerabilities or backdoors being present which could represent safety issues if exploited by malicious actors.

In conclusion, open source keyloggers are a viable and cost-effective solution for those looking to track computer input without having to purchase a commercial product. However, due to their somewhat limited featureset compared to commercial options and security vulnerabilities, it is important for users to take appropriate precautions when installing such software on their systems.

Features Provided by Open Source Keyloggers

  • Stealth: Open source keyloggers are designed to be undetectable and not interfere with other programs running on the same computer. They may use special techniques to hide their presence, such as encryption or registry hiding.
  • Monitoring: Open source keyloggers can monitor all user activity on the system, including activities like website visits, program usage, and file access, allowing you to gain insights into users' behavior. This can also help you detect suspicious behavior from staff or family members, if needed.
  • Logging: Open source keyloggers record all user input, including email messages, chat conversations, login attempts and more. This allows employers and parents alike to review their user's online activity without having to install any extra software or manually search around a computer’s hard drive for evidence of wrongdoing.
  • Alerts & Notifications: Many open source keyloggers come with features that allow you to set up alerts when certain words appear in monitored data streams or when predetermined criteria is met. This way you can stay informed about any unwanted or malicious activity taking place on your system in real-time, if necessary.
  • Remote Access & Control: Open source keyloggers can also provide remote access capabilities so one can view logs from anywhere in the world if they have an internet connection. Some even feature management tools that let you control settings remotely as well (stopping/starting monitoring sessions for example).
  • Automation: Another beneficial feature of open source keyloggers is their ability to trigger certain actions based on predetermined conditions. These could include things like disabling certain ports, blocking IP addresses and so on. This allows one to maintain control over their system without needing to be there in person all the time.

Types of Open Source Keyloggers

  • Ghostpress: This type of open source keylogger is capable of capturing detailed data such as keystrokes, screenshots, clipboard and system data. It can also be used to monitor activities on the user’s computer.
  • Logkeys: This type of open source keylogger has a recording capability that allows it to capture all keystrokes entered into the keyboard including passwords, emails and search terms. Additionally, this program is designed with stealth mode capabilities so that any changes made can not be detected without further investigation.
  • Revealer Keylogger Free Edition: This open source keylogger is designed with a built-in password recorder which enables it to discreetly record the information inputted into various applications and websites on a computer. It can also inform users when specific programs are opened or when certain keywords are entered in order to alert them of suspicious activities.
  • Spyrix Free Keylogger: This free version of Spyrix includes features such as recording typed text entries, emails sent and received, browsing histories and conversations in IM/VOIP programs. Its full version also provides a remote monitoring function which allows users to view logs from a remote location via their personal computer or mobile device.
  • Iwantsoft Free KeyLogger: This free edition offers an automatic start up feature which allows the program to run completely invisible in the background while still logging all user activity on the device it’s installed on. Additionally, its advanced security settings enable users to customize what will be monitored as well as set restrictions for certain applications and websites in order protect sensitive information from being compromised.
  • Elite Keylogger: This open source keylogger is detailed in its logging capabilities as it can record nearly every action a user takes on their computer including program usage, website visits and chat conversations. Additionally, it has the ability to capture screenshots of the computer’s activity which can provide valuable insight into what occurred during certain periods.
  • BlackBox Express: This open source keylogger offers several features to protect against unauthorized access and usage of the program. Its powerful encryption capabilities allow it to conceal its activity while still allowing users to gain detailed insight into their computer’s activity. Additionally, it is designed with stealth mode functions that can help keep its presence undetected from others.

Advantages of Using Open Source Keyloggers

Open source keyloggers are a great tool to have in any data security arsenal. Here are some of the benefits they provide:

  • Cost: Open source keyloggers are typically free or come with very low costs, meaning that anyone can access them without having to stretch their budget.
  • Customizable: Open sourcekeyloggers are fully customizable, allowing users to tailor their functionality and features to their specific needs. This includes accommodating changing hardware requirements or tweaking the code to suit the organization’s particular need.
  • Flexible: As open source software is always being developed, it allows for users to take advantage of updates and patches at no additional cost and as soon as they become available. This helps ensure that your security does not become outdated over time.
  • Secure: By leveraging existing open source code for keylogging rather than starting from scratch, organizations can reap the benefits of already established security protocols that maximize their data protection efforts.
  • Transparent: Since the source code is readily available whenever needed, organizations can quickly identify any potential vulnerabilities in their system so that those issues can be addressed quickly and securely before any damage arises.

Who Uses Open Source Keyloggers?

  • IT Professionals: IT professionals often use open source keyloggers for security purposes, such as tracking system activity and monitoring user input. They are likely to be well-versed in coding and able to customize the software to their needs.
  • Home Users: Home users may use open source keyloggers for a range of different reasons, from keeping a record of typed information, such as passwords or bank details, to parental control or simply monitoring computer usage.
  • Businesses: Businesses can take advantage of open source keyloggers to increase productivity and security across the network. For example, they can be used to track employee behavior on corporate networks and prevent data theft.
  • Hackers/Cybersecurity Researchers: Hackers/cybersecurity researchers may use open source keyloggers for testing the vulnerabilities of computers or networks by trying to access confidential information through typing it out on a monitored machine.
  • Government Agencies: Government agencies may use open source keyloggers for surveillance purposes related to national security issues, such as tracking down cybercriminals or terrorists.

How Much Do Open Source Keyloggers Cost?

Open source keyloggers can be obtained for free, as they are generally available in the public domain. However, if you want to use a more advanced version of an open source keylogger, it may be necessary to purchase a commercial product that is based on an open source codebase. These products will typically cost between $50 and $200, depending on the features they support and how easy they are to install and configure. Even then, there are some open source projects that offer feature-rich remote access keyloggers for no cost at all, making them a great option for those who don’t need or want to pay for an expensive commercial solution. Ultimately, the cost of a keylogger will depend on what features and capabilities are needed, and what type of technical expertise is available to properly install and configure the software.

What Software Can Integrate With Open Source Keyloggers?

Open source keyloggers can integrate with a variety of different software types, including but not limited to operating systems, web browsers, productivity suites, and more. Operating systems such as Linux and macOS provide support for open source keylogger integration through their included file system resources. Web browsers like Firefox also often make available extensions or plugins that allow users to add an open source keylogger platform while they browse the internet. Productivity suites like Microsoft Office typically provide facilities that allow users to include an open source keylogger in their documents, allowing them to capture data typed into spreadsheets or other files. Additionally, there are several mobile applications that can integrate with an open source keylogger on phones and tablets.

Trends Related to Open Source Keyloggers

  • Open source keyloggers have become increasingly popular over the last few years, as they provide a cost-effective way to capture user input on computers without any special hardware or software.
  • They can be used to track user activity and monitor computer performance, which is especially useful for businesses that want to keep an eye on their employees’ activities.
  • Open source keyloggers are also becoming increasingly powerful, with the ability to log keystrokes, take screenshots, and even record audio and video.
  • As open source keyloggers become more widely available, they are becoming easier to set up and use. This has led to a surge in popularity among users who are looking for an easy way to keep an eye on their computers.
  • The emergence of open source keyloggers has also led to a rise in sophisticated cyberattacks. These attacks can be used by hackers to gain access to sensitive information such as passwords and credit card numbers.
  • As open source keyloggers become more popular, security experts are recommending that users employ additional measures such as firewalls and antivirus software in order to protect their systems from these types of attacks.

How To Get Started With Open Source Keyloggers

Getting started with open source keyloggers is relatively easy and can be done in a few simple steps.

First, you will want to identify an appropriate open source logging application for your needs. There are many options out there, so do some research to find the best one for your situation. Be sure to check reviews from other users and determine what features the software offers that make it stand out. You may want to look into how secure it is as well since these programs record sensitive data, security should be top of mind.

Once you've found your logging program of choice, download it and install it on your computer or device. Depending on which platform you're using (Windows, MacOS, iOS, etc.), installation instructions may vary slightly. Refer to the documentation that comes bundled with the app, if necessary.

Next, configure the program according to your preferences and settings. With most applications this step involves adjusting basic settings such as frequency of logging or particular keystrokes which you wish log specifically. You can also specify any other parameters needed by selecting appropriate options in its setup wizard or interface tab, such as whether certain software applications should be excluded from logging activities or not, based on your needs and situation.

Finally, when everything is up and running properly execute the logging process itself by launching the application's Start command; then leave it going in background until all desired logs have been recorded through automatic scheduled intervals (usually customizable). To stop recording, just hit Stop button once again in application's interface menu when necessary–usually allowing recovered data files being exported quickly via copy-paste function at user's discretion thereafter too.

In conclusion, getting started with open source keyloggers is relatively straightforward. Just make sure to select the right program for your needs, install it properly and configure settings based on desired parameters then execute logging by launching Start command at appropriate time so that all information can be recorded accurately and securely as expected.