With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
A tool that tracks your keypresses and stores them locally
A tool that tracks your keypresses and stores them locally in a JSON file.
Every time you press a key, it stores that keypress in a list and every 30 seconds, all of the keys inside of that list will be stored in the Keypresses.json file and sorted.
...A keystroke logger or keylogger is basically a program that records keystrokes and saves them in a log file on your local computer. This keylogger is simple and bare bones, but works wonderfully and is useful for a number of things. You can use it to track key movements and make sure no one is using your computer while you’re away, or use it for self-analysis. In businesses and offices it can be used to monitor employee activity; in schools it can track keystrokes and log banned words.
...However, as keyboards evolved, more keys got added. So the module now supports a module parameter codes which shows the keycode shift_mask pair in hex (codes=1) or decimal (codes=2). You can lookup the keycodes in /usr/include/linux/input-event-codes.h.
The keypress logs are recorded in debugfs as long as the module is loaded. Only root or sudoers can read the log. The module name has been camouflaged to blend-in with other kernel modules.
You can, however, execute a script at shutdown or reboot (the procedure would be distro-specific) to save the keys to a file.
...
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
NLoger is a Linux KeyLogger designed to be simple, small, and still get the job done right.
Surprising enough, software KeyLoggers are quite rare, especially on the Linux platform. And the ones that do exist, are not universal to all Linux distributions, however, NLoger is.
NLoger is ideal for SSH and terminal bi-user workspaces.
...*manny016 is busy at the moment.
*Some issues are being fixed and testing for issues.
*The new software's finished last march 2013 but it's being hold because of some personal issues.
Thank You For Your Support Please Never Stop Waiting!!!
So what's to wait in the new catcher?
Data storage is in xml.
VB language.
Data is fixed for data analysis.
Not detected as a maleware any more.
Easy to use, open and terminate.
-manny016
this is keylogger based on linux logkeys. it record inputs created on ur keyboard.i create GUI for ubuntu to assist newbie to use it. written in BUC. installer currently is just bash file. trying to get it running in deb.written in malay language.
An Open Source Key logger Created in Borland Delphi 7.
Supports any Operaring System, and safest of it's kind.
It's unique and untraceable, use it for anything you can imagine.
...It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
Strokey is a small hardware keyboard logger saving all keystrokes into an EEPROM memory for later investigation. The device may get attached to any PS/2-keyboard by intercepting the cable, or get placed directly inside for maximum invisibility.