Install spyware on your computer. Convenient online software store for Windows

Who among us hasn’t wanted to feel like a cool hacker at least once and break at least something? :) Even if not, then let’s talk about how great it would be to get a password from your mail/social network. the network of a friend, wife/husband, roommate thought at least once by everyone. :) Yes, and you have to start somewhere, after all! A significant part of attacks (hacking) involves infecting the victim’s computer with so-called keyloggers (spyware).

So, in today’s article we’ll talk about what are free programs for monitoring windows-based computers, where you can download their full versions, how to infect a victim’s computer with them, and what are the features of their use.

But first, a little introduction.

What are keyloggers and why are they needed?

I think you yourself have guessed what it is. As a rule, they are a kind of program that is hidden (although this is not always the case) installed on the victim’s computer, after which it records absolutely all keystrokes on this node. Moreover, in addition to the clicks themselves, the following is usually recorded: the date and time of the click (action) and the program in which these actions were performed (browser, including the website address (hurray, we immediately see what the passwords are for!); local application; system services (including Windows login passwords), etc.).

From here one of the problems is immediately visible: I got access to my neighbor’s computer for a couple of minutes and I want to get her password from VK! I installed the miracle program and returned the computer. How can I look up passwords later? Looking for a way to take the computer from her again? The good news is: usually not. Most keyloggers are capable of not only storing the entire accumulated database of actions locally, but also sending it remotely. There are many options for sending logs:

  • A fixed email (there may be several) is the most convenient option;
  • FTP server (who has it);
  • SMB server (exotic, and not very convenient).
  • A fixed flash drive (you insert it into the USB port of the victim’s computer, and all logs are copied there automatically in invisible mode!).

Why is all this needed? I think the answer is obvious. In addition to the banal stealing of passwords, some keyloggers can do a number of other nice things:

  • Logging correspondence in specified social networks. networks or instant messengers (for example, Skype).
  • Taking screenshots of the screen.
  • View/capture webcam data (which can be very interesting).

How to use keyloggers?

And this is a difficult question. You need to understand that just finding a convenient, functional, good keylogger is not enough.

So, what is needed for a spy program to work successfully?:

  • Administrator access to a remote computer.
    Moreover, this does not necessarily mean physical access. You can easily access it via RDP (Remote Desktop Service); TeamViewer; AmmyAdmin, etc.
    As a rule, the greatest difficulties are associated with this point. However, I recently wrote an article about how to get administrator rights in Windows.
  • Anonymous e-mail / ftp (by which you will not be identified).
    Of course, if you are breaking Aunt Shura for your neighbor, this point can be safely omitted. As is the case if you always have the victim’s computer at hand (ala, find out your brother/sister’s passwords).
  • Lack of working antiviruses / internal Windows protection systems.
    Most public keyloggers (which will be discussed below) are known to the vast majority of antivirus software (although there are logger viruses that are built into the OS kernel or system driver, and antiviruses can no longer detect or destroy them, even if they have detected them). Due to the above, anti-virus software, if any, will have to be mercilessly destroyed. In addition to antiviruses, systems like Windows Defender (these first appeared in Windows 7 and onwards) also pose a danger to our spyware. They detect suspicious activity in software running on a computer. You can easily find information on how to get rid of them on Google.

These, perhaps, are all the necessary and sufficient conditions for your success in the field of stealing other people’s passwords / correspondence / photos or whatever else you want to encroach on.

What types of spyware are there and where can I download them?

So, let's start with a review of the main keyloggers that I used in my daily practice with links to free downloads of their full versions (i.e., all versions are the latest at the moment (for which it is possible to find a cure) and with already working and tested cracks).

0. The Rat!

Ratings (out of 10):

  • Stealth: 10
  • Convenience/usability: 9
  • Functionality: 8

It's just a bomb, not a keylogger! In working condition it takes 15-20 KB. Why be surprised: it is written entirely in assembly language (veteran programmers shed tears) and written mostly by enthusiastic hackers, due to which the level of its secrecy is simply amazing: it works at the OS kernel level!

In addition, the package includes FileConnector - a mini-program that allows you to connect this keylogger with absolutely any program. As a result, you get a new exe of almost the same size, and when launched, it works exactly like the program with which you glued it together! But after the first launch, your keylogger will be automatically installed in invisible mode with the parameters for sending logs that you have previously specified. Convenient, isn't it?

An excellent opportunity for social engineering (bring a game file/presentation to a friend on a flash drive, or even just a Word document (I’ll tell you how to create an exe file that launches a specific word/excel file in one of my next articles), launch, everything is fine and wonderful, but the friend is already invisibly infected!). Or you simply send this file to a friend by mail (preferably a link to download it, since modern mail servers prohibit sending exe files). Of course, there is still a risk from antivirus software during installation (but it will not exist after installation).

By the way, with the help of some other techniques you can glue together any hidden installation distribution (these are found in The Rat! and Elite keylogger) not only with exe files (which still raise suspicion among even more or less advanced users), but also with ordinary word / excel and even pdf files! No one will ever think anything about a simple pdf, but that’s not the case! :) How this is done is the topic of a whole separate article. Those who are especially zealous can write me questions through the feedback form. ;)

Overall, The Rat! can be described for a very long time and a lot. This was done much better than me. There is also a download link there.

1. Elite keylogger

Ratings (out of 10):

  • Stealth: 10
  • Convenience/usability: 9
  • Functionality: 8

Perhaps one of the best keyloggers ever created. Its capabilities, in addition to the standard set (interception of all clicks in the context of applications / windows / sites), include interception of instant messenger messages, pictures from a webcam, and also - which is VERY important! - interception of WinLogon service passwords. In other words, it intercepts Windows login passwords (including domain ones!). This became possible thanks to its work at the system driver level and launch even at the OS boot stage. Due to this same feature, this program remains completely invisible to both Kasperosky and all other anti-malware software. Frankly, I have not met a single keylogger capable of this.

However, you shouldn’t delude yourself too much. The installer itself is recognized by antiviruses very easily and to install it you will need administrator rights and disabling all antivirus services. After installation, everything will work perfectly in any case.

In addition, the described feature (working at the OS kernel level) introduces requirements for the OS version on which the keyloggers will work. Version 5-5.3 (links to which are given below) supports everything up to and including Windows 7. Win 8 / 10, as well as Windows server family (2003 / 2008 / 2012) are no longer supported. There is version 6, which functions perfectly, incl. on win 8 and 10, however, it is currently not possible to find a cracked version. It will probably appear in the future. In the meantime, you can download Elite keylogger 5.3 from the link above.

There is no network operation mode, therefore it is not suitable for use by employers (to monitor the computers of their employees) or an entire group of people.

An important point is the ability to create an installation distribution with predefined settings (for example, with a specified email address where logs will need to be sent). At the same time, at the end you get a distribution kit that, when launched, does not display absolutely any warnings or windows, and after installation it can even destroy itself (if you check the appropriate option).

Several screenshots of version 5 (to show how beautiful and convenient everything is):

2. All-in-one keylogger.

Ratings (out of 10):

  • Stealth: 3
  • Convenience/usability: 9
  • Functionality: 8

It is also a very, very convenient thing. The functionality is quite at the level of Elite keylogger. Things are worse with secrecy. Winlogon passwords are no longer intercepted, it is not a driver, and is not built into the kernel. However, it is installed in system and hidden AppData directories, which are not so easily accessible to unauthorized users (not those on whose behalf it is installed). Nevertheless, antiviruses sooner or later successfully do this, which makes this thing not particularly reliable and safe when used, for example, at work to spy on your own superiors. ;) Gluing it to something or encrypting the code to hide it from antiviruses will not work.

Works on any version of Win OS (which is nice and practical).

As for the rest, everything is fine: it logs everything (except Windows login passwords), sends it anywhere (including e-mail, ftp, fixed flash drive). In terms of convenience, everything is also excellent.

3. Spytech SpyAgent.

Ratings (out of 10):

  • Stealth: 4
  • Convenience/usability: 8
  • Functionality: 10

Also a good keylogger, although with dubious secrecy. Supported OS versions are also all possible. The functionality is similar to previous options. There is an interesting self-destruct function after a specified period of time (or upon reaching a predetermined date).

In addition, it is possible to record video from a webcam and sound from a microphone, which can also be very popular and which the previous two representatives do not have.

There is a network mode of operation, which is convenient for monitoring an entire network of computers. By the way, StaffCop has it (it is not included in the review due to its uselessness for one user - an individual). Perhaps this program is ideal for employers to spy on their employees (although the leaders in this field are unconditionally StaffCop and LanAgent - if you are a legal entity, be sure to look in their direction). Or to keep track of your offspring who love to sit and watch “adult sites”. Those. where what is needed is not concealment, but convenience (including a bunch of beautiful log reports, etc.) and functionality for blocking specified sites/programs (SpyAgent also has it).

4. Spyrix Personal monitor.

Ratings (out of 10):

  • Stealth: 4
  • Convenience/usability: 6
  • Functionality: 10

The functionality is at the level of the previous candidate, but the same problems with secrecy. In addition, the functionality includes an interesting thing: copying files from USB drives inserted into the computer, as well as remote viewing of logs through a web account on the Spyrix website (but we are going to download a cracked version, so it will not work for us).

5. Spyrix Personal monitor.

Ratings (out of 10):

  • Stealth: 3
  • Convenience/usability: 6
  • Functionality: 8

I won’t describe it in detail, because... this instance does not have anything that one of the previous spies did not have, however, someone may like this keylogger (at least for its interface).

What do we end up with?

The issue of using a keylogger is more ethical than technical, and it greatly depends on your goals.

If you are an employer who wants to control his employees, feel free to set up StaffCop, collect written permission from all employees for such actions (otherwise you may be seriously charged for such things) and the job is in the bag. Although I personally know more effective ways to increase the performance of my employees.

If you are a novice IT specialist who just wants to experience what it’s like to break someone - and how this thing works in general, then arm yourself with social engineering methods and conduct tests on your friends, using any of the examples given. However, remember: the detection of such activity by victims does not contribute to friendship and longevity. ;) And you definitely shouldn’t test this at your work. Mark my words: I have experience with this. ;)

If your goal is to spy on your friend, husband, neighbor, or maybe you even do it regularly and for money, think carefully about whether it’s worth it. After all, sooner or later they may attract. And it’s not worth it: “rummaging through someone else’s dirty laundry is not a pleasant pleasure.” If you still need to (or maybe you work in the field of investigating computer crimes and such tasks are part of your professional responsibilities), then there are only two options: The Rat! and Elite Keylogger. In the mode of hidden installation distributions, glued with word / excel / pdf. And it’s better, if possible, encrypted with a fresh cryptor. Only in this case can we guarantee safer activities and real success.

But in any case, it is worth remembering that the competent use of keyloggers is only one small link in achieving the goal (including even a simple attack). You don’t always have admin rights, you don’t always have physical access, and not all users will open, read, and even more so download your attachments/links (hello social engineering), the antivirus won’t always be disabled/your keylogger/cryptor won’t always be unknown to them . All these and many untold problems can be solved, but their solution is the topic of a whole series of separate articles.

In short, you have just begun to dive into the complex, dangerous, but incredibly interesting world of information security. :)

Sincerely,Lysyak A.S.

Spyware is used to monitor the computer equipment of office workers and enterprise workers. This is also a good solution for monitoring children while parents are not at home.

Computer spy programs have nothing to do with malicious software. Mostly they are installed with the permission of the PC administrator and do not cause any harm. Viruses operate on a different principle: they are installed without the administrator’s permission and deliberately spy on the user, collecting confidential information and transferring it to third parties. The management of companies and enterprises inform their employees about established programs for monitoring the production process.

Spy programs for computer

– this spy program is a universal tool for monitoring user actions on a personal computer. Several available installation options: admin and hidden. With a hidden installation, processes are not displayed in the task manager. The program is used for home monitoring of children and monitoring the actions of employees at the enterprise. Neospy Software shareware, you can purchase the paid version for 1990 rubles on the official website.

NeoSpy features:

  • interception keyboard presses;
  • possibility of creating screenshots;
  • collection system event data;
  • tracking using instant messengers and recording voice/video calls;
  • report about computer operation.

Advantages:

  • Russian-language interface;
  • functionality;
  • real-time computer monitoring;
  • hidden installation.

Flaws:

– universal English-language spy program. The main feature of this software is that it not only tracks user actions, but also blocks certain operations on the computer. When creating an account, users can add a ban on certain actions on the PC. To use full functionality you will need purchase paid version at a price of $40.

Possibilities:

  • monitoring typed text from the keyboard;
  • report about system events;
  • Creation multiple accounts.

Advantages:

  • creating a policy prohibiting certain actions on a PC;
  • work in semi-hidden mode.

Flaws:


- used as keylogger, and has additional functionality:

  • control over the contents of the clipboard;
  • the ability to take screenshots;
  • tracking visited sites.

The program has no special advantages; it contains quite standard functions for such software. Among the shortcomings It can be noted that when using the module for tracking keystrokes on the keyboard, only English text is recorded correctly.

SpyGo

This computer tracking software is intended for home use only. SpyGo can also be used to monitor employees of offices and enterprises. Program shareware, you can purchase the full version at a price from 990 to 2990 rubles, depending on the set of options.

Possibilities:

  • keyboard spy;
  • record system events on the PC (launching applications, working with files, etc.);
  • control visiting web resources;
  • receiving images from the user's screen in real time;
  • obtaining information about the contents of the clipboard;
  • opportunity to receive recording from a microphone(if it is connected).

Advantages:

  • work in covert surveillance mode;
  • computer activity reports;
  • tracking search queries and time spent visiting Internet sites.

Flaws:


Snitch

Snitch is an easy-to-use spy program that allows you to monitor user activities on your PC.

Possibilities:

  • monitoring keyboard, clipboard and system events;
  • tracking user actions on the Internet and in instant messengers;
  • compilation summary reports about computer operation.

Advantages:

  • blocking forced termination of a process in the task manager;

Flaws:

  • there is no hidden mode of operation;
  • conflicts with antiviruses.

– the utility is a keylogger that allows you to save data entered in the windows of any programs, browsers, instant messengers, etc. Also provides detailed report in PC operation. The program runs in hidden mode, does not appear in the task manager and does not create shortcuts on the desktop or in the Start menu. The program can be buy at price 49$.

Possibilities:

  • reading typed texts from all forms filled out;
  • hidden operating mode;
  • receiving screen data user in real time;
  • sound recording from a microphone.

Advantages:

  • functionality;
  • provision of summary reports;
  • hidden mode of operation.

Flaws:


Expert Home

Expert Home is a free computer activity tracking software that allows you to track and record all user actions. This software is used primarily to provide parental control.

Possibilities:

  • interception keyboard presses;
  • Creation pictures screen;
  • blocking certain actions on the computer;
  • provision reports about system events on the PC.

Advantages:

  • hidden mode of operation;
  • convenient navigation;
  • undemanding to resources.

Flaws:


SC-KeyLog

Free software designed to track keystrokes. Additionally, SC-KeyLog has the ability to collect data on mouse clicks.

Possibilities:

  • data collection entered from the keyboard;
  • tracking visited sites;
  • hidden mode work;
  • report with information about actions performed from the PC.

Advantages:

  • distributed free of charge;
  • collecting data on all actions on the PC (launching applications, working with files).

Flaws:


- fully free keylogger for Windows 7/8/10, which allows detailed monitoring of user activity. Ideally used as a parental control tool.

Possibilities:

  • invisibility in the task manager;
  • collection entered data from the keyboard;
  • tracking visited websites.

Advantages:

  • free distribution;
  • functionality;
  • convenient interface.

No shortcomings were found in the program.

Winspy

– this spy program is used as a means of parental control and monitoring the activity of employees on computers.

Possibilities:

  • remote installation;
  • interception text information from the keyboard;
  • hidden operating mode.

Advantages:

  • undemanding operating system resources;
  • functionality.

Flaws:


Vkurse for Android

Vkurse – spyware for devices running Android OS. Allows you to track user actions on your phone or tablet in real time.

Possibilities:

  • simultaneous control behind all instant messengers running on the device;
  • allows take a photo screen;
  • tracking entered text information from the Android keyboard;
  • detection using GPS;
  • record incoming and outgoing calls.

Advantages:

  • hidden operating mode without an active window;
  • Possibility of installation without root;
  • does not boot the system.

Flaws:

  • the ability to detect the application through the “Task Manager” (task manager).

How to detect spyware on your computer

If a spyware program works in hidden mode, it will be quite difficult to detect it. In our review we used only legal software, which is not malicious, but at the same time it can be detected by antiviruses. It is recommended to add such software to exceptions. If you don’t need to remove the program, but only need to disguise your actions on your PC from it, use anti-spying tools that will block the interception of keyboard presses.

Computer spy software will help you find out what your child or employee is doing on the computer, and will also clarify what sites they visit, with whom they communicate, and what they write to.

For this purpose, there are spy programs - a special type of software that, unnoticed by the user, collects information about all his actions.

Computer spy software will solve this problem.

Spyware for a computer should not be confused with a Trojan: the first is absolutely legitimate and is installed with the knowledge of the administrator, the second gets onto the PC illegally and carries out hidden malicious activities.

However, hackers can also use legitimate tracking programs.

Spyware applications are most often installed by business managers and system administrators to monitor employees, parents to spy on children, jealous spouses, etc.

In this case, the “victim” may know that he is being monitored, but most often he does not know.

Review and comparison of five popular spyware programs

NeoSpy

NeoSpy is a universal spy program for the keyboard, screen and user actions. NeoSpy works invisibly and can hide its presence even during installation.

The user who installs the program has the opportunity to choose one of two installation modes - administrator and hidden.

In the first mode, the program is installed openly - it creates a shortcut on the desktop and a folder in the Program Files directory, in the second - hidden.

Program processes do not appear in Windows Task Manager and third-party task managers.

The functionality of NeoSpy is quite wide and the program can be used both as home monitoring and in offices to monitor employees.

Real Spy Monitor

The next spy is Real Spy Monitor. This English-language program not only has tracking functions, but can also block certain actions on .

Therefore, it is often used as a parental control tool.

For each account in the Real Spy Monitor settings, you can create your own, for example, for visiting certain sites.

Developers position Actual Spy as a keylogger (keylogger), although the program can do more than just record keystrokes.

It monitors the contents of the clipboard, takes screenshots, monitors site visits, and other things that are included in the main set of spies we examined.

When installed, Actual Spy creates a shortcut in the Start menu so it can be noticed by the user.

The launch also occurs openly - to hide the program window you need to press certain keys.

Actual Spy's capabilities are not much different from those of its competitors. Among the shortcomings, users noted that it correctly records keystrokes only in the English layout.

Hello friends! If you thought that in this article I would write about how to hack someone else’s computer and harm it, then this is not so. Today's article will be from the security section. I will write about how to organize monitoring of a computer, and for this we will use the NeoSpy program, I will write how to install it, how to configure it and how to use it to get the result we need.

As I already wrote, we will not illegally break into someone else’s computer. This program can and should be used to monitor, for example, your child’s computer, or the computers of your subordinates. Yes, this is not very good. But there are times when you just need to find out what sites your child visits and who he communicates with on social networks.

If you are an entrepreneur, you can organize monitoring of your employees’ computers. Thus, find out what they do during working hours. They work, relax, or generally leak information to competitors, it may sound funny, but this also happens.

There are as many ways to use NeoSpy as there are possibilities for this program. Now let's test it and see what it can do.

Let's say a few more words about the NeoSpy program so that you understand what kind of program it is and what it does, and then we'll start installing and configuring it. To put it simply, this program will help you organize monitoring of the computer on which you actually install this program.

Example: you installed a program on your home computer that your child uses. When you turn on your computer, NeoSpy will launch itself and remain invisible. It will monitor all actions that will be performed on the computer. Here are some and, in my opinion, the most necessary:

  • Keep track of visited sites
  • Tracks and saves correspondence in ICQ and other clients
  • Monitors running applications
  • Can track keystrokes on the keyboard
  • Periodically takes screenshots of the screen
  • Saves the clipboard
  • Intercepts passwords from social networks and other sites.

These are just some of the features of the NeoSpy program. This means the program collects all this, and you can then view all this information in a form convenient for you, in the form of tables, screenshots and Internet pages. You can also monitor your computer over the network. By the way, if you install this program on a laptop, then if it is stolen, you will be able to track its location. That's enough, now let's get to the point.

How to organize computer monitoring

We need NeoSpy spy program. Go to the website http://ru.neospy.net/download/ and download the program. We save the file, for example, on the desktop, now we will install it.

I also want to immediately write about the price and the special offer. This means the program is paid, but not expensive. Depending on the version, price starts from 490 rubles. and up to 1280 rubles. You can buy it on the page http://ru.neospy.net/buy/. But you can test the program for free, for 60 minutes and with some reduced functions. This is enough to understand whether you need NeoSpy or not.

I have a gift for you :).

Enter the code when purchasing 8563-2368 and you will receive a 10% discount!

Run the file we downloaded “neospy.exe”. Click “Next”.

We read about the program’s capabilities and click “Next” again.

We read and accept the license agreement, click “Next”.

Now we need to select the installation type. There are Administrator and Hidden installations.

Administrative– select if you do not need to hide the program. It can be launched from a shortcut on the desktop, in the Start menu, etc. If you want to monitor your computer, it is better to choose a hidden installation.

Hidden installation– when you select this item, the program can only be launched by clicking “Start”, “Run” and entering the command neospy.

Decide and click “Install”.

We are waiting for NeoSpy to install, during the installation process you will need to answer two questions, click “Yes”. Once the installation is complete, click “Verified”. The program will start itself.

Setting up and starting computer tracking

The program is very simple, for which many thanks to the developers. By pressing just one button, you can start tracking, enable hidden mode and stop tracking your computer.

Just below there are three buttons to view tracking results.

Let's say we need to track what sites a child visits. Press the button “Start tracking” and in order to hide the program, make it invisible, click “Hidden Mode”.

The program will disappear completely, but will monitor the computer. And you can mind your own business.

Viewing computer monitoring results

In order to stop tracking and view the results, you need to:

On Windows XP: “Start”, “Run”.

On Windows 7: “Start”, “All programs”, “Standard”, “Run”.

Enter the command neospy.

A window with the program will open, click on “Stop tracking”. Now you can start viewing your tracking results. Click on the button with the appropriate way to view the results.

That's all. It’s that simple, you can find out what is being done on your computer during your absence, what sites your children visit, and what your employees do during working hours. If you only want to protect your children from sites that are not really for children, then I recommend the “Internet Sheriff” program, which will block sites that are unwanted for your child.

I think that in this article you received answers to your questions, and the NeoSpy program will help protect your children from unnecessary information, which is now a lot on the Internet. Good luck!

Also on the site:

Monitoring your computer using NeoSpy updated: February 3, 2013 by: admin

Our library of examples of detecting and neutralizing spyware has already accumulated quite a lot of articles, and we decided to classify this material.
The classification is based on the subjective assessment of technical specialists from our test laboratory. Since we plan to continue testing popular spyware, we believe that this classification will help users of the COVERT disguiser and visitors to our website better understand the place of each spyware in the mosaic of modern threats.

We give each spy three ratings:
The first is design and functionality.. The higher the score, the more opportunities the program provides for data theft and user tracking.
The second is secrecy within the system. How difficult can it be to detect on a computer. The higher the score, the better the program hides itself.
Third - evaluates the spy’s protection from anti-spyware and the difficulty of neutralizing it. The higher the score, the more diligently the program clings to its existence on the computer and the more steps need to be taken towards its complete removal. Some programs cannot be removed by simply erasing the file folder from the disk.

— RLM: 8 / 3 / 2

JETLOGGER allows you to monitor user activity on the computer, collects information about running programs, visited sites and key combinations used, structures the received data and displays them in the form of charts and graphs. You can enable automatic creation of screenshots at certain intervals. Hides the fact that information about activity on the device is collected.

— RLM: 4 / 0 / 1

Yaware.TimeTracker is a system for recording working hours and assessing the efficiency of employees at the computer.

— RLM: 5 / 2 / 3

Award Keylogger is a fairly popular spyware program that is described on many sites as a powerful real-time tracking tool with rich functionality. But we were not able to see all the listed functionality, although we tested the latest fully functional version. The program turned out to be not much better than the average spy.

— RLM: 5 / 0 / 0

Real Spy Monitor is designed to monitor activity on a computer and allows you to save information about launched programs, opened files and windows, take screenshots, monitor which sites users visit, intercept and save keyboard input.

— RLM: 5 / 1 / 1

LightLogger has a fairly standard set of functions: it tracks visited websites, takes screenshots at a given frequency, intercepts keyboard input in applications, browsers and email, remembers all running programs, and copies the contents of the system buffer.

— RLM: 7 / 1 / 0

REFOG Personal Monitor will provide full control over the system, recording any keystrokes in a log. In addition, he periodically takes screenshots so that the observer has a complete picture of what is happening on the computer. All reports are sent to the specified email. The spy's work is invisible on the computer: it does not reveal itself in any way and consumes very few system resources.

— RLM: 5 / 3 / 3

TheRat can be installed on a computer using social engineering. In addition to traditional keylogger functions, the program can monitor actions in application windows and respond to words, as well as take screenshots of the screen every time you press the Enter key. A special feature of the keylogger is that it works on the principle of incorporeal viruses.

— RLM: 6 / 2 / 1

Snitch collects data about user activity and transmits it to its server, from which it is sent to the control module and displayed in its interface.

— RLM: 2 / 0 / 0

Hide Trace is a typical screenshotter that monitors user actions, creating a detailed report of open windows and taking screenshots.

— RLM: 6 / 8 / 6

WebWatcher records all activity that occurs on the PC: emails, instant messenger messages, information about visited sites, activity on Facebook/MySpace networks and everything that the user types in real time. Takes screenshots and tracks all search queries. All collected information is sent to special servers, where the observer can view the results of surveillance remotely.

— RLM: 6 / 0 / 2

DameWare Mini Remote Control Server allows you to connect and control remote machines via the Internet or local network. Can secretly, unnoticed by the observed, control all his actions.

RLM: 7 / 2 / 2

Kickidler - The program has good functionality, but is easy to detect and remove. There is a function for blocking entry into the COVERT secure platform, which can easily be bypassed using a masker.

— RLM: 3 / 1 / 0

Total Spy - the interface is extremely simple, the program is small in size and does not affect system performance. But the functionality in the program is only basic.

— RLM: 7 / 8 / 5

PC Pandora— hides in the system and controls the entire computer and Internet traffic. Takes screenshots, receives keyboard input, actions on visited websites, email, instant messengers and collects much other information about the user’s work. The program does not have a folder in which it stores its data. Everything is loaded into the operating system, and each new installation on the same or another computer is made with new file names.

— RLM: 5 / 7 / 4

Micro Keylogger is a well-hidden spyware program that is not visible in the Start menu, taskbar, control-programs panel, process list, Msconfig startup list, and other places on the computer where it is possible to monitor running applications. It shows no signs of presence and does not affect system performance; it secretly sends a report to email or an FTP server. Its activity is carried out through DLLs.

— RLM: 4 / 0 / 0

Expert Home- a multifunctional program for covert surveillance and detailed recording of all actions performed on a computer with a remote tracking function, which allows you to view reports and screenshots anywhere, from any device, as long as you have Internet access.

— RLM: 7/ 0 / 0

Monitors a remote computer in real time, takes pictures of the user from the computer's webcam, records sounds in the room where the computer is installed, scans the file system, remotely downloads files, views and deletes system processes, and other functions standard for a spy program.

— RLM: 5 / 1 / 1

System Surveillance Pro provides everything you need to monitor your PC in stealth mode. The utility records text input, instant messages, applications used and sites visited, and also takes screenshots at a specified time interval or by event.

RLM: 3 / 0 / 0

KidLogger PRO, is an open-source keylogger that can record audio from a microphone and take screenshots. Delivery of logs/screenshots is possible by email or to the manufacturer’s website, where they can already be viewed. It can also simply store logs with screenshots locally.

— RLM: 7 / 0 / 0

Remote Manipulator System - remote monitoring and control, allows you to connect to a remote computer and control it as if you were sitting directly in front of its screen.

— RLM: 6 / 2 / 1

NeoSpy spy is a computer tracking program that allows you to conduct hidden monitoring of the system. Tracks all actions performed by users on the monitor screen via the Internet from a computer, smartphone and tablet.

— RLM: 6/5/3

SoftActivity Keylogger tracks and records all user actions on the computer.
It works secretly and unnoticed even by savvy users; not a single process in the task manager, no files can be seen in the system.
The configuration utility and uninstallation option are password protected.

— RLM: 4 / 1 / 0

Snooper is an audio spy designed to record sounds that are picked up by a microphone connected to the computer; in recording mode it is not displayed in the tray, and is not visible in the list of processes in the Windows task manager. As long as the microphone does not detect sounds, the spy remains in sleep mode.

— RLM 5/0/0

The Best KeyLogger is a program that allows you to always have full control over your computer.
The program allows you to read the entire history of actions on your computer in your absence.
With this program, you can view chat logs, as well as mail, and see which sites the user has visited.

— RLM: 5 / 1 / 1

SpyAgent is a program for complete control over user actions. Monitors system performance, including recording keystrokes, programs launched, files opened, and much more. Allows you to record all online activity - FTP, HTTP, POP3, Chat and other TCP/UDP communications, including visited websites. Takes screenshots, sends the collected data to the specified e-mail, there is the possibility of remote control of the program.

— RLM: 6 / 2 / 0

Ardamax Keylogger - takes screenshots, intercepts clipboards and keystrokes on the keyboard. Spy has a hidden mode and is not visible in the task manager. The program creates a log of all actions for subsequent analysis.

— RLM: 8 / 1 / 0

Spyrix Personal Monitor allows you to conduct hidden control over any activity on your computer - on social networks (VKontakte, Odnoklassniki, Facebook, etc.), chats and emails, visiting websites and queries in search engines (Yandex, Google). Spyrix Personal Monitor is designed for centralized monitoring of all user activities.

— RLM: 2 / 6 / 6

All In One Keylogger logs all keystrokes, including language specific characters, conversations and conversation messages, passwords, email, clipboard information, microphone sounds, screenshots, Internet activities. The spyware does not appear in running processes.

— RLM: 8 / 6 / 7

Mipko Personal Monitor - monitors activity on the computer, monitors which sites are visited on the Internet, saves all user actions to the hard drive - keystrokes, sites visited, application launches, screenshots. When working in hidden mode, it is not visible by standard system tools and is not displayed in the list of processes. It works absolutely unnoticed, like an invisible person, works well with antiviruses and remains undetected in 95% of cases.

— RLM: 3 / 1 / 0

Free Keylogger Remote is capable of intercepting keystrokes and copied text from any application. It can also record the names of running applications, visited websites, and take screenshots after a specified period of time. The spy operates in invisible mode and cannot be accessed. There is a function for remote monitoring and sending daily reports by email.

— RLM: 7 / 1 / 0

SpyGo is a software package for covert monitoring and tracking of user activity on a computer. It is controlled remotely and allows for real-time monitoring. It works in stealth mode and remains invisible during monitoring.

— RLM: 3 / 1 / 0

The hidden agent Actual Spy is capable of monitoring all events occurring in the system: intercepting all keystrokes, detecting case and Russian layout, taking screenshots (screenshots), remembering the launch and closing of programs, monitoring the contents of the clipboard, recording Internet connections, register visited sites and much more.

— RLM: 5 / 1 / 1

Elite Keylogger is designed to secretly monitor all types of user activity. The keylogger's capabilities include tracking all types of correspondence from ICQ to e-mail, websites visited by users, passwords typed and programs used. The spy generates snapshots of the user's desktop screen. Can send a report on user actions to an email after a certain fixed period of time.

— RLM: 6 / 0 / 2

Using the Power Spy utility, you can take screenshots from the screen at certain intervals, record keyboard strokes, and Internet pages visited. You can also view email messages read using Microsoft Outlook and Microsoft Outlook Express, and documents opened in Word and Notepad. The program, based on the specified parameters, sends a report by E-mail or writes it to a hidden log file.

— RLM: 6 / 5 / 5

The STAKH@NOVETS software package is designed to monitor the computer network of an enterprise. It provides complete information about each employee. Surveillance of company personnel can be carried out in a completely hidden mode.

— RLM: 6 / 0 / 3

StaffCop monitors running programs, applications and websites on work PCs. Intercepts messages in ICQ, Skype, e-mail and other instant messengers. Takes screenshots of the monitor screen, records keystrokes and much more that is part of the concept of “computer control”.

(KGB) - RLM: 7 / 1 / 0

KGB SPY is one of the most popular programs designed to spy on personal computer users. It intercepts and stores a detailed log of user actions on the hard drive, takes screenshots, records software launches, etc.

— RLM: 1 / 1 / 0

Punto Switcher is designed to change keyboard layouts automatically on your computer. At the same time, it can be used as a keylogger if you make certain settings changes.