What are Keyloggers
Submitted by Srikanth on Friday, 7 November 200837 Comments
Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke.
There are two types of keystroke loggers:
1. Software based and
2. Hardware based.
Spy ware: Spector (www.spector.com)
- Spector is a spy ware and it will record everything anyone does on the internet.
- Spector automatically takes hundreds of snapshots every hour, very much like a surveillance camera. With spector, you will be able to see exactly what your surveillance targets have been doing online and offline.
- Spector works by taking a snapshot of whatever is on your computer screen and saves it away in a hidden location on your computer’s hard drive.
Hacking Tool: eBlaster (www.spector.com)
- eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away.
- eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address.
- Within seconds of them sending or receiving an email, you will receive your own copy of that email.
Hacking Tool: (Hardware Keylogger) (www.keyghost.com)

- eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away.
- eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address.
- Within seconds of them sending or receiving an email, you will receive your own copy of that email.
Hacking Tool: (Hardware Keylogger)
- The Hardware Key Logger is a tiny hardware device that can be attached in between a keyboard and a computer.
- It keeps a record of all key strokes typed on the keyboard. The recording process is totally transparent to the end user.
Popularity: 4% [?]
Visitors who read this post, also read:
By using/following this site you agree to our Legal Disclaimer


Hi Srikanth, you are doing a good job. I have 1 question for you.
Remote keylogger / Super Keylogger which you described earlier in many posts have less chances to work perfectly when the intended user is gonna use a good ANTIVIRUS version with all updates and vulnerability removed.
Isnt?
In this case , how can we able to hack that pc ? (ie.,while Superkeyloggers fail )
Hope you have a solution. If not its ok
Everyone here are learning
@ blaster
You r right! All keyloggers are none other than spywares..
So almost all the keyloggers are lokely to be caught by AV.
For this hardware keyloggers can be used(if u have physical access to the pc)….
Hello, I need help, I have been reading the comments and I still feel that I need more info. I would like to send my Fiance a Keylogger on his laptop. I would like to send it to him via email.
My reason? we are getting married soon, and I have found out he has a secret email address and has be visiting the adultfriendfinder site. I dont care that he has been there, sure I was mad at first, but he said he is NOT talking with women on there, and strickly watching videos.
I need to be sure he is truthful..I love him and want to marry him, but if he is actually hooking up with women ( gut feeling ) I cant be with him… please help…
I need to find a keylogger that I can send him via email..
Anyone want to help a really nice HONEST girl? I signed up for crackpal, but now im nervous about it…it looks like a scam
Much thanks in advance
@ Wool over eyes
You can use superkeylogger for this purpose!
can u plz tel me how to exexute a html file from c program,,,
i tried using a batch file,but showing the folowing error
Bad command or file name
When i execute the batch file directly it is not showing error
but when i execute that batch file using that c program, it is showing error.BR/or tel me any way to open a html file directly from c program without using batch file commands..
spector and eblastor serials are working only for 1 day..after that the license is being cancelled..what to do…
@ anonymous
It’s easy to execute a .html file.
Just use the following command
system(“filename.htm”); OR
system(“filename.html”);
Hi srikanth you are creating awareness on various topics, which are useful. I really appreciate you
srikanth
Give me SuperkeyLogger Link Please…
I have norton 2008. It is not leting me install keylogger.Is it harmful for my computer.Should i turn of norton and install it.
@ Karan
Since keyloggers are spywares it is common for antivirus to block it. If you are just installing a keylogger for testing purpose, the you can temporarily disable the antivirus. After testing remove the keylogger.
Hi,
I noticed you mentioned you are able to use a superkeylogger to send it to someone in an email. I have downloaded a number of programmes from the net, none of which are allowing me to do so as they do not have the facility.
Can you please suggest an appropriate programme which will do this job which is free to try. Also is it possible you can briefly describe how to use it in this way.
I have the keylogger in exe file …………… but how can i trick them to accept and run the exe file as some users dont run them for keyloggers to be installed……… any idea????
How can i disguise an exe file as a harmless jpg or movie file.
@ Sana
You can surely change the icon of the exe file to make it look like a mpeg(movie file). To change the icon of the exe file, please refer the following post…
http://www.gohacking.com/2008/10/how-to-change-icon-of-exe-file.html
Where can I get the keywords and other formats for creating Batch files.
Like How to execute a file using batch file and how to create autorun file to invoke that batch file.. Please help me Sri na..
Anonymous,
keyloggers are highly impossible to send via mail considering most mail webclients like gmail, hotmail, yahoo will never let you attach a .exe file to your mail. And if you think you’ll be able to disguise it you’re wrong whatever media you’re combining your .exe with it’ll come out .exe the best you can do is… well you can’t change that. im not sure what narendran is trying to say. basicly what im getting from is that he wants to write his own keylogger with batch files.. which is impossible, learn C++ or VB. if you want you use your keylogger with a friend, fiance whatever best bet is to quickly install it by physical access.
could you please tell me how to send keylogger on any other pc , please explain me in detail
@ ravi
You can directly attact the keylogger to email as an attachment OR
upload the keylogger and send the download link to the victim via email.
Hi.. I am new to this website,,,,
i want more information about keylogger.. how to download.. how to use….?
pls give me replay…
@ KING
refer the following post..
http://www.gohacking.com/2008/01/hacking-e-mail-account.html
hey srikanth
cn u pls tell me ho does a keylogger (& an anti keylogger) works……………… i wnt to learn abt it
hey shrikant,
Do you have something like how to write your own keylogger in a notepad?
please help
with good regards.
pls where can i down a keylogger
hello i can”t use my email plese help me
Ok i want to know the best keylogger program that will most of the time never get caught by a anti virus and one that i can use to send to someones email i heard you say superkeylogger was good but i cant find anywhere to download it can you show me a link? Also is there a better one than that one? thx
@ Masterx
Refer
http://www.gohacking.com/2009/03/best-spy-software.html
hi sri………
i hv lost , or someone hacks my yahoo id , so i cant access it plz help me plz
send me email on
[email protected]
hi sri!!!
as the guy said in one of the earlier posts.. that yahoo, gmail etc. sites do not allow us to attach .exe files.. so how would we be able to attach and send them to the victim…??
If we change the extension of the file… then the file won’t work after receiving by the victim….
@ aj
You’ll have to upload the file to a free FTP account and send the download link to the victim via email. OR you can also upload the file to rapidshare and send it’s link to the victim via email.
Srikanth, you are a hero sir. thank you. your site has been instantly added to the favorites list and i feel that i will spend many hours learning the trade.
i was wondering if maybe you could elaborate on the rapidshare and how it all works, or perhaps direct me to a preexisting article.
thanx again
hai srikanth bro
i hav checked tht spinner spy kelogger to hacking email account but i hav got only trial version
i think we full version to hacking
hi srikanth…suppose others installed a keyloggerin our pc with out our permission.
how can we find if keylogger is working in our pc without using antikeylogger software.
@ arun
You can find the presence of keylogger by scanning your PC using an antispyware.
Great site, added to my favs.
I have been told you can see someones password for emails, forum membership, myspace ect without any type of software if they are on your computer. Is this true? If so, how is this done?
mr. srikanth i want to hack an orkut profile of my friend…as she disturbs me a lot….can u suggest an easy of hacking her profile i am having her email id…….plz
hi srikanth i jus started hacking ..so is it a crime r can i continue
i want to learn the hacking. without spending money or joining any classes is it possible to gain sufficient knowledge? i wan detail snapshots how to get password by using keylogger? can u help me????
Leave your response!
EMAIL SECURITY »
What to Do When Your Email Account is Hacked?
How to Recover Hacked Email Accounts?
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. …
HOW-TO GUIDES »
How to Trace Mobile Numbers
With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number …
INTERNET SECURITY »
How Antivirus Software Works
Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even though every one …
NETWORK HACKS »
How to Hack an Ethernet ADSL Router
Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a …
VIRUS CREATION »
How to Test the Working of your Antivirus – EICAR Test
Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will …
Categories
Blogroll
Recent Comments
Most Commented
Most Popular
Log In | Entries (RSS) | Comments (RSS) | Sitemap
© 2008-2011 GoHacking.Com. This content is copyrighted to Srikanth and may not be reproduced on other websites.