Page of 41
First page | Prev | Next | Last page |

Stukach

Category: Windows Hacking, Desktop Tools, Keyboard Logger

Title: Stukach

Format: Win9x/Me/NT/2000

Description: Stukach is a tiny little programm, which can run hiddenly on some computer, keeping track of everything user types on the keyboard, and sending this information to you via e-mail. Of course, user never would know you are reading his e-mail and stuff, unless you would say him.

Download Now



Rnskeylogger

Category: Windows Hacking, Desktop Tools, Keyboard Logger

Title: Rnskeylogger

Format: Win9x/Me/NT/2000

Description: Intructions in the tool. Invisible: Run the exe file, u won't see the tool on your desktop, it works completly invisible , just check the rnsinvkey.txt The txt file is in the RNS Keyloggerinvisible directory. Press Ctrl+Alt+Delete and remove the "Systrey" (not the "Systray") entry to exit the tool.

Download Now



Stealth Keyboard

Category: Windows Hacking, Desktop Tools, Keyboard Logger

Title: Stealth Keyboard

Format: Win9x/Me/NT/2000

Description: (SKIn98 AS) - is a general-purpose security program that tracks and reports all activity on your PC. All window titles, keystrokes, menus, mouse clicks, and actions taken are recorded to a password-protected log file and optionally emailed to a preconfigured e-mail address.

Download Now



Keyprobe

Category: Windows Hacking, Desktop Tools, Keyboard Logger

Title: Keyprobe

Format: Win9x/Me/NT/2000

Description: Key Probe is a small program that invisibly monitors a Windows system, and logs any keystrokes occuring on that machine to file. See what the users of your machine are doing: where they are going, whom they are talking to, and what they are saying. Key Probe can also be used quite effectively as a password catcher.

Download Now



Keyspy

Category: Windows Hacking, Desktop Tools, Keyboard Logger

Title: Keyspy

Format: Win9x/Me/NT/2000

Description: KeySpy (by Serge Beland) is used to capture what someone has typed on a PC keyboard. KeySpy can send recorded keystrokes in an encrypted and compressed format to your e-mail or save them in a hidden disk file. Then, with the decryption window, you just paste in the encrypted keystrokes to discover what has been typed. KeySpy can also be used as a backdoor or remote control for the spied computers. With the task manager, you can easily download any program and execute it, copy, delete, and move any file on the spied computers. Additional features include the ability to record any keystroke, even from a DOS window; complete transparency, even from ctrl-alt-del; and the ability to start recording at the Window login.

Download Now


First page | Prev | Next | Last page |