Spytector is the most undetectable keylogger available on the market! Windows 8 Compatible! FUD Keylogger! Free Trial Download!

Spytector Keylogger

Spytector KeyLogger
Windows 8 Ready
Windows 8 Compatible
32-bit and 64-bit

Spytector 1.4.1 - the new version of the undetectable keylogger (parental control software) is available for download.


Spytector is the ultimate invisible and undetectable keylogger (keystroke logger) that completely satisfies your PC monitoring and surveillance needs. Spytector keylogger is running in total stealth, undetectable even for advanced users, perfect for monitoring the way your PC is used.


The trial version of Spytector is detected by few antivirus applications, even if it's not a trojan or a hacking tool. Therefore you should temporary disable your AV while testing the trial version. The full version of Spytector is undetected when scanned with all the well known antivirus products. Our powerful and professional key logger can be used by home and corporate users. All the PC activity is stored in secured encrypted log files. The logs are received either by email or FTP (the log sending procedure is invisible and undetectable for many local firewalls) and afterwards they can be converted in eye catching reports by the in-built Log Viewer. The full colored logs can be saved as RTF or HTML files.

Spytector is completely stealth on the user's desktop and cannot be seen in the Task Manager, being hidden into system processes.


The current version of Spytector is compatible with Windows 2k, XP, Vista, Windows 7 and Windows 8 (32bit and 64bit).

What's new in version 1.4.1:

- feature to retrieve the passwords stored in newest versions of FireFox, Opera, Google Chrome, Internet Explorer, Safari, GoogleTalk, Outlook, Windows Live Messenger etc.
- numerous internal improvements and fixes

Facebook Fan Twitter Follow Google Follow
Monitoring features
  • keystrokes
  • websites
  • both sides of chat (AIM, ICQ, Yahoo Messenger, MSN Messenger)
  • applications
  • keylogging filter (only specific websites/windows are tracked)
  • clipboard monitoring
  • boot events
  • passwords
Main application features
  • built-in log viewer utility
  • option to save the settings
  • the logs can be saved as RTF and HTML files
  • multi-language interface
  • editable "server" name, log name, log size, startup key name
  • all the mentioned "server" features are editable from the main application
  • local logfile retrieving
  • skinnable interface
Keylogger features
  • FTP and Email log delivery
  • remotely deployable
  • option to find the locally stored passwords for FireFox, Opera, Google Chrome, Internet Explorer, Safari, GoogleTalk, Outlook, Windows Live Messenger
  • option to include URL history in the log
  • the logs can be received either when they reached a minimum size or at specified day intervals
  • full compatibility with Windows NT4, 2000, XP, 2003, VISTA, Windows 7, Windows 8 (32-bit and 64-bit)
  • both small and large icons of the server can be changed
  • editable "server" name, log name, log size
  • smart keylogging (BACKSPACE is applied)
  • melting option
  • warning message option
  • option to uninstall the keylogger after a specifed number of sent logs
  • option to uninstall the keylogger with a specified hotkey
  • option to uninstall the keylogger by checking HTTP
  • delay (the server will be active after a specified time or after boot)
Security features
  • totally invisible and undetectable keylogger server
  • advanced firewall bypass techniques (the keylogger is undetectable by many local firewalls)
  • stealth reports delivery (using the default browser or email client)
  • local encrypted logfiles
  • optional encryption for delivered logs
  • encrypted settings
  • over-writing protection
  • password protected configuration
  • password protected uninstallation for the main application
  • protection against uninstallation
  • option to disable the System Restore feature (2k, XP)
  • option to restrict the access to specified websites
  • option to restrict the access to specified applications