Browse free open source Keyloggers and projects below. Use the toggles on the left to filter open source Keyloggers by OS, license, language, programming language, and project status.

  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1

    Keylogger

    A simple keylogger for Windows, Linux and Mac

    Keylogger is a simple keystroke logger for Windows, Mac and Linux. A keystroke logger or keylogger is basically a program that records keystrokes and saves them in a log file on your local computer. This keylogger is simple and bare bones, but works wonderfully and is useful for a number of things. You can use it to track key movements and make sure no one is using your computer while you’re away, or use it for self-analysis. In businesses and offices it can be used to monitor employee activity; in schools it can track keystrokes and log banned words.
    Downloads: 88 This Week
    Last Update:
    See Project
  • 2

    spyware

    A complete SpyWare.

    A complete local and configurable spyware. This spyware is a python package compiled for Windows. This spyware is not a virus, it does not export any data to a server. Data is stored locally only. Do not use it for illegal purposes. - Save keyboard events - Record from microphone - Save files metadata in CSV file - Screenshots - Pictures from Webcam - Domains and IP addresses from metadata - Save clipboard
    Downloads: 81 This Week
    Last Update:
    See Project
  • 3
    A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 4
    LKL is a userspace keylogger that runs under Linux on the x86 arch. LKL logs everything that passes through the hardware keyboard port (0x60). It translates keycodes to ASCII with a keymap file.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5

    JKeyLogger

    Java Key Logger

    Java-written keylogger. Can write you key presses/releases to file. Writes in format: 'hour-minute-second: [KEY-PRESS/KEY-RELEASE] keycode (char)'
    Downloads: 9 This Week
    Last Update:
    See Project
  • 6
    Basic Key Logger
    Non-stealth keylogger for Windows. Records mouse and keyboard (precision~10-15ms), log of events (disk size~2.5k/s) + log of operations (~ 0.2k/s). Standalone, with local copy of Python: unzip to install, delete to uninstall.NEW: hidden/visible icon
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Winhook Keylogger

    Winhook Keylogger

    Windows Hook Keylogger

    The Internet is full of such stuff. So why not introduce to you another one? Go! This is another example of using Win32 API functions to hook some system messages. Just run it once to start listening to the keyboard and clipboard and writing all content into a text log file. Recording will stop the second time you execute it. The author promises that this keylogger has no undeclared functions and is not a malicious program. It is intended for educational use and not for collecting sensitive information.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 8
    KeyCounter is a tool for the tray-bar that helps you to get statistics about the useage of your computers keyboard, mouse and uptime. KeyCounter is not intended to work as a keylogger.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 9

    NimKeylogger

    Keylogger and saves keyboard events in a Keyboard Catpure file

    This nim script implements a keylogger and saves keyboard events in a Keyboard Catpure file.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 10
    AcousticSoundboard

    AcousticSoundboard

    Free, easy to use, lightweight soundboard for Windows

    Acoustic Soundboard is a free, open source program for Windows which strives to be easy to use and lightweight. The main purpose is to conveniently play audio files to others while allowing the user to hear what is playing and still use their microphone normally. There is no installation required, simply unzip the contents wherever you like. On closing, the soundboard will automatically save the user's last devices, sounds, and hotkeys to a database file. View a demo video here https://www.youtube.com/watch?v=cPdncc-q1oM If you want others to hear your microphone and the sounds you play, you will first need to install a virtual audio cable such as this one: https://vb-audio.com/Cable/ IMPORTANT: Windows may warn you that this program contains a virus because it hooks the keyboard. Your data stays on your computer only. Please see the readme for more information.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    The Best Keylogger

    The Best Keylogger

    The Best Keylogger software is a convenient utility.

    The Best Keylogger software is a convenient utility that lets you keep track of all activity or logs on your computer, either visibly or invisibly. Download and try All in One Keylogger free of charge and get full access to all product functions for a 3-day trial period. - http://www.thebestkeylogger.com
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    An Open Source Key logger Created in Borland Delphi 7. Supports any Operaring System, and safest of it's kind. It's unique and untraceable, use it for anything you can imagine.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13

    Windows Domain Credentials Phishing Tool

    Video: https://vimeo.com/89782344

    While performing a Pen test for a client i needed to catch a domain user name and password, there are several ways to gain users passwords and it really depends on a lot of factors on how to get it in my case i didn't had time to wait for the user to enter his credentials and get it using a key logger so I and @Roni_Bachar created a fake windows domain login window to tried to force and trick the user to enter his password. There are several tools and techniques such as "Mimikatz" but they require you to have administrative/system privileges, you don't need special privileges to execute "Windows Domain Credentials Phishing Tool". * Special Thanks to @Roni_Bachar (https://twitter.com/roni_bachar) For the idea and help in developing the tool. If you find this tool useful crypto currency donations are welcome: Bitcoin: 1Kksc9b4WZ5X36xGDgpodPVpBSozMje6ui Litecoin: LQ1JCMxo122FpJ8iKX7HsrNtjCacpTkkFW
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    Complete autoclicker

    Complete autoclicker

    Autoclicker Keylogger Set and reload scripts, random delay + overlayer

    HardWorkingBruh is a powerful and versatile tool designed to streamline your repetitive tasks and actions on your computer. Say hello to your new bruh for automating tasks and making your life easier! HardWorkingBruh is here to boost your productivity and take care of your repetitive tasks . Perfect for gamers , coders , or anyone looking to save time on everyday tasks . With its powerful tables, flexible recording, and handy overlay features, this autoclicker is the ultimate companion for all your clicking needs. Whether it's pixel wars, keyword lists, or just a quick combo press, this bruh's got your back!
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    Simple Clipboard Logger

    Simple Clipboard Logger

    AutoSaves any text clipboard data into a single TXT file

    Sometimes I lament losing important information from my clipboard so I made this to record it all into a single TXT file with timestamps. Its a fully offline python program that works in your windows tray, that lets you access the TXT file any time you need. Sadly, its worth mentioning that keyloggers that hackers use to steal data work with the same method as this program, except they hide it and send the data online, so this program may result in a false positive with your installed antivirus. You'll need to create an exception to let this program not get quarantined by accident. Source code is included with the program and this program will never send your data anywhere or record it anywhere else than that single TXT file so I assure you it is safe - you can check the source code yourself.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    apps tracker

    apps tracker

    Computer monitoring & time tracking app

    apps tracker is all in one computer monitoring and time tracking solution. Some of the features are: activitiy logging, keystrokes capturing, screenshots, email reports, application blocking, file change monitoring ... UI is inspired by "Metro" design, built with WPF Requires Microsoft .NET framework v4.5 Download page includes a setup file for installing the app and the zip file as portable version where no installation is necessary
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    This project is to develop an installer package for a python key logger I modified for stealth use It will be packaged with NSIS for distribution on portableapps.com and elsewhere. it will fit on a usb key and provide quick and easy key logging on the go
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    AES Chipter

    AES Chipter (E-Posta şifreleme yazılımı)

    AES Chipter kişisel olarak gönderdiğiniz e-postaların meraklı kişiler tarafından izlenmesini engellemeyi amaçlayan bir sistemdir. Meraklı gözlerden bıktınızsa ya da bilgisayarınızdan gönderdiğiniz e-postaların başkası tarafından okunmasını istemiyorsanız AES Chipter tam size göredir. Kuruluma ihtiyaç duymaz, kullandıktan sonra silerek hiçbir iz bırakmadan anonim olarak şifreli e-posta göndermiş olursunuz. Sizin belirlediğiniz bir şifre ve konu başlığı adı altında çok uzun bir şifreli anahtarı da sizin şifreniz ile karıştırarak programda çok karmaşık bir şifre oluşturur. Bu sebeple siz kısa bir şifre bile yazsanız kendi oluşturduğu şifre sayesinde çok uzun ve karmaşık bir şifre anahtarı oluşturur. Bu işlem sayesinde bilgisayarınızda “keylogger” adı verilen tuş kaydetme yazılımları olsa bile, sadece şifrenizle iletiniz okunamayacaktır.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Keylogger Free
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    Questo software può evitare che alcuni keylogger elementari,basici, possano carpire le nostre password e/o username poichè i valori testuali possono essere scritti con una testiera virtuale ed il valore così prodotto è passato "via javascript" alla casella di testo della pagina web saltando così lo stream della tastiera che potrebbe essere intercettato . Il software è sotto la licenza New BSD . La versione attuale è un' alpha.( https://en.wikipedia.org/wiki/Software_release_life_cycle) This software can prevent some elementary,basic , keyloggers from stealing our passwords and/or usernames since the text values can be written with a virtual text box and the value thus produced is passed “via javascript” to the text box of the web page thus skipping the keyboard stream that could be intercepted . The software is under the New BSD license . The current version is an 'alpha.( https://en.wikipedia.org/wiki/Software_release_life_cycle)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Linux X.Org Record Extension C Keylogger.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    With multilogger you may log keys, sound, webcam and the screen!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    pyshot-client
    pyshot-client is an agent installed on recorded machines.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    A USLESS KEYLOGGER |MZL

    A USLESS KEYLOGGER |MZL

    A keylogger that save your data with yourself and works

    A keylogger that save your data with yourself and works as backup of every text you write
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next

Open Source Keyloggers Guide

Open source keyloggers are a type of software designed to monitor and record the actions that take place on a computer. They are similar to other types of tracking programs such as monitoring malware, but their primary purpose is to track keyboard input. Open source keyloggers can capture whatever the user types on their computer, including emails, chat messages, logins and passwords, and even banking information. This makes them an effective tool for gathering data from users without their knowledge or consent.

Because open source keyloggers are created using publicly available code or libraries, they can be distributed freely with little concern for copyright infringement. This also means that anyone can take the code and modify it according to their own needs or preferences without having to pay a licensing fee. As a result, many developers create custom versions of open source keyloggers by adding additional features not found in standard versions.

The downside to using open source keyloggers is that they often don't have the same level of sophistication as commercial products such as Keylogger Pro or Spector Pro. Because these kinds of software are designed for malicious purposes, such as stealing data, they tend to include notable features such as encryption for added security measures. Open source solutions usually lack these features because they weren't built with nefarious intent in mind.

However, despite this drawback there are some advantages associated with open source solutions over commercial ones; the biggest being cost savings (as no fees apply). Additionally, since third-party developers may contribute enhancements to existing versions, many users find that open source solutions offer more flexibility than commercial ones when it comes to customization and upgrades down the line. It's worth noting that since anyone has access to an open source program’s codebase there is always a risk of hidden vulnerabilities or backdoors being present which could represent safety issues if exploited by malicious actors.

In conclusion, open source keyloggers are a viable and cost-effective solution for those looking to track computer input without having to purchase a commercial product. However, due to their somewhat limited featureset compared to commercial options and security vulnerabilities, it is important for users to take appropriate precautions when installing such software on their systems.

Features Provided by Open Source Keyloggers

  • Stealth: Open source keyloggers are designed to be undetectable and not interfere with other programs running on the same computer. They may use special techniques to hide their presence, such as encryption or registry hiding.
  • Monitoring: Open source keyloggers can monitor all user activity on the system, including activities like website visits, program usage, and file access, allowing you to gain insights into users' behavior. This can also help you detect suspicious behavior from staff or family members, if needed.
  • Logging: Open source keyloggers record all user input, including email messages, chat conversations, login attempts and more. This allows employers and parents alike to review their user's online activity without having to install any extra software or manually search around a computer’s hard drive for evidence of wrongdoing.
  • Alerts & Notifications: Many open source keyloggers come with features that allow you to set up alerts when certain words appear in monitored data streams or when predetermined criteria is met. This way you can stay informed about any unwanted or malicious activity taking place on your system in real-time, if necessary.
  • Remote Access & Control: Open source keyloggers can also provide remote access capabilities so one can view logs from anywhere in the world if they have an internet connection. Some even feature management tools that let you control settings remotely as well (stopping/starting monitoring sessions for example).
  • Automation: Another beneficial feature of open source keyloggers is their ability to trigger certain actions based on predetermined conditions. These could include things like disabling certain ports, blocking IP addresses and so on. This allows one to maintain control over their system without needing to be there in person all the time.

Types of Open Source Keyloggers

  • Ghostpress: This type of open source keylogger is capable of capturing detailed data such as keystrokes, screenshots, clipboard and system data. It can also be used to monitor activities on the user’s computer.
  • Logkeys: This type of open source keylogger has a recording capability that allows it to capture all keystrokes entered into the keyboard including passwords, emails and search terms. Additionally, this program is designed with stealth mode capabilities so that any changes made can not be detected without further investigation.
  • Revealer Keylogger Free Edition: This open source keylogger is designed with a built-in password recorder which enables it to discreetly record the information inputted into various applications and websites on a computer. It can also inform users when specific programs are opened or when certain keywords are entered in order to alert them of suspicious activities.
  • Spyrix Free Keylogger: This free version of Spyrix includes features such as recording typed text entries, emails sent and received, browsing histories and conversations in IM/VOIP programs. Its full version also provides a remote monitoring function which allows users to view logs from a remote location via their personal computer or mobile device.
  • Iwantsoft Free KeyLogger: This free edition offers an automatic start up feature which allows the program to run completely invisible in the background while still logging all user activity on the device it’s installed on. Additionally, its advanced security settings enable users to customize what will be monitored as well as set restrictions for certain applications and websites in order protect sensitive information from being compromised.
  • Elite Keylogger: This open source keylogger is detailed in its logging capabilities as it can record nearly every action a user takes on their computer including program usage, website visits and chat conversations. Additionally, it has the ability to capture screenshots of the computer’s activity which can provide valuable insight into what occurred during certain periods.
  • BlackBox Express: This open source keylogger offers several features to protect against unauthorized access and usage of the program. Its powerful encryption capabilities allow it to conceal its activity while still allowing users to gain detailed insight into their computer’s activity. Additionally, it is designed with stealth mode functions that can help keep its presence undetected from others.

Advantages of Using Open Source Keyloggers

Open source keyloggers are a great tool to have in any data security arsenal. Here are some of the benefits they provide:

  • Cost: Open source keyloggers are typically free or come with very low costs, meaning that anyone can access them without having to stretch their budget.
  • Customizable: Open sourcekeyloggers are fully customizable, allowing users to tailor their functionality and features to their specific needs. This includes accommodating changing hardware requirements or tweaking the code to suit the organization’s particular need.
  • Flexible: As open source software is always being developed, it allows for users to take advantage of updates and patches at no additional cost and as soon as they become available. This helps ensure that your security does not become outdated over time.
  • Secure: By leveraging existing open source code for keylogging rather than starting from scratch, organizations can reap the benefits of already established security protocols that maximize their data protection efforts.
  • Transparent: Since the source code is readily available whenever needed, organizations can quickly identify any potential vulnerabilities in their system so that those issues can be addressed quickly and securely before any damage arises.

Who Uses Open Source Keyloggers?

  • IT Professionals: IT professionals often use open source keyloggers for security purposes, such as tracking system activity and monitoring user input. They are likely to be well-versed in coding and able to customize the software to their needs.
  • Home Users: Home users may use open source keyloggers for a range of different reasons, from keeping a record of typed information, such as passwords or bank details, to parental control or simply monitoring computer usage.
  • Businesses: Businesses can take advantage of open source keyloggers to increase productivity and security across the network. For example, they can be used to track employee behavior on corporate networks and prevent data theft.
  • Hackers/Cybersecurity Researchers: Hackers/cybersecurity researchers may use open source keyloggers for testing the vulnerabilities of computers or networks by trying to access confidential information through typing it out on a monitored machine.
  • Government Agencies: Government agencies may use open source keyloggers for surveillance purposes related to national security issues, such as tracking down cybercriminals or terrorists.

How Much Do Open Source Keyloggers Cost?

Open source keyloggers can be obtained for free, as they are generally available in the public domain. However, if you want to use a more advanced version of an open source keylogger, it may be necessary to purchase a commercial product that is based on an open source codebase. These products will typically cost between $50 and $200, depending on the features they support and how easy they are to install and configure. Even then, there are some open source projects that offer feature-rich remote access keyloggers for no cost at all, making them a great option for those who don’t need or want to pay for an expensive commercial solution. Ultimately, the cost of a keylogger will depend on what features and capabilities are needed, and what type of technical expertise is available to properly install and configure the software.

What Software Can Integrate With Open Source Keyloggers?

Open source keyloggers can integrate with a variety of different software types, including but not limited to operating systems, web browsers, productivity suites, and more. Operating systems such as Linux and macOS provide support for open source keylogger integration through their included file system resources. Web browsers like Firefox also often make available extensions or plugins that allow users to add an open source keylogger platform while they browse the internet. Productivity suites like Microsoft Office typically provide facilities that allow users to include an open source keylogger in their documents, allowing them to capture data typed into spreadsheets or other files. Additionally, there are several mobile applications that can integrate with an open source keylogger on phones and tablets.

Trends Related to Open Source Keyloggers

  • Open source keyloggers have become increasingly popular over the last few years, as they provide a cost-effective way to capture user input on computers without any special hardware or software.
  • They can be used to track user activity and monitor computer performance, which is especially useful for businesses that want to keep an eye on their employees’ activities.
  • Open source keyloggers are also becoming increasingly powerful, with the ability to log keystrokes, take screenshots, and even record audio and video.
  • As open source keyloggers become more widely available, they are becoming easier to set up and use. This has led to a surge in popularity among users who are looking for an easy way to keep an eye on their computers.
  • The emergence of open source keyloggers has also led to a rise in sophisticated cyberattacks. These attacks can be used by hackers to gain access to sensitive information such as passwords and credit card numbers.
  • As open source keyloggers become more popular, security experts are recommending that users employ additional measures such as firewalls and antivirus software in order to protect their systems from these types of attacks.

How To Get Started With Open Source Keyloggers

Getting started with open source keyloggers is relatively easy and can be done in a few simple steps.

First, you will want to identify an appropriate open source logging application for your needs. There are many options out there, so do some research to find the best one for your situation. Be sure to check reviews from other users and determine what features the software offers that make it stand out. You may want to look into how secure it is as well since these programs record sensitive data, security should be top of mind.

Once you've found your logging program of choice, download it and install it on your computer or device. Depending on which platform you're using (Windows, MacOS, iOS, etc.), installation instructions may vary slightly. Refer to the documentation that comes bundled with the app, if necessary.

Next, configure the program according to your preferences and settings. With most applications this step involves adjusting basic settings such as frequency of logging or particular keystrokes which you wish log specifically. You can also specify any other parameters needed by selecting appropriate options in its setup wizard or interface tab, such as whether certain software applications should be excluded from logging activities or not, based on your needs and situation.

Finally, when everything is up and running properly execute the logging process itself by launching the application's Start command; then leave it going in background until all desired logs have been recorded through automatic scheduled intervals (usually customizable). To stop recording, just hit Stop button once again in application's interface menu when necessary–usually allowing recovered data files being exported quickly via copy-paste function at user's discretion thereafter too.

In conclusion, getting started with open source keyloggers is relatively straightforward. Just make sure to select the right program for your needs, install it properly and configure settings based on desired parameters then execute logging by launching Start command at appropriate time so that all information can be recorded accurately and securely as expected.