Spytector is the most undetectable keylogger available on the market! Windows 10 Keylogger | FUD Keylogger

Spytector KeyStroke Logger - User Manual
Spytector KeyStroke Logger - Youtube Presentation


Spytector Install
Spytector can be successfully installed on any PC running Windows 2k/XP/Vista/Windows 7/Windows 8/Windows 10 (32-bit and 64-bit).

Spytector consists of 2 parts: the main program (used to create the "server") and the "server" file (the actual keystroke logger).

At the first step of the installation process the user must agree to the End-User License Agreement (EULA), afterwards being able to configure the installation directory, to create shortcuts (Start Menu, Desktop, Quick Launch) and an entry in the Add/Remove Programs list.

There are 2 options available for Spytector: portable or with install kit. If you don't need entries in Start Menu, Quick Launch etc., the best option is to use the portable/standalone Spytector. In this case Spytector main application will run from wherever you copy it.

<< back to top
Server Install

Spytector "server" (keylogger) can be successfully installed on any PC running Windows 2k/XP/2003/Vista/Windows 7, Windows 8 and Windows 10 (32-bit and 64-bit).


The "server" configuration is established from the main application. The settings include "server" name, logfile name, logfile size, log delivery options, keylogger filter, access restrictions and much more. After all the required settings are set the "server" must be created using the Build Server button. All the settings are encrypted and appended to the "server" file. The "server" is a standalone application, it doesn't depend in any way on the installed Spytector, so the same server can be run on all your computers. When the server is doubleclicked it'll automatically copy itself in the system. In the trial version a message box is displayed asking the user to agree with the keylogger installation.

<< back to top
Spytector Uninstall
By uninstalling Spytector (main application) all the created files and registry entries will be deleted.

Spytector can be uninstalled from the Add/Remove Programs in Control Panel or from the Start Menu shortcut.

In the case of the portable version, the program can be simply deleted.

<< back to top
Server Uninstall
In the trial version, the "server" is automatically uninstalled after you've received 3 logs (either by Email/FTP or locally from the main Spytector program).

Also, when the "server" is built you have the option to set a hotkey for the uninstallation (the default hotkey is CTRL+SHIFT+F1). If that option is enabled, whenever you press the specified hotkey the "server" will silently remove itself.

<< back to top
Purpose
Spytector is an advanced monitoring program (spy software, keystroke logger) which is tracking all the activities of PC users (visited websites, all the keystrokes, opened windows, applications etc.) and delivers the logs to you via Email or/and FTP. More than that, in the delivered logs could be also included the locally stored passwords for newest versions of FireFox, Opera, Google Chrome, Internet Explorer, Safari, GoogleTalk, Outlook, Windows Live Messenger etc. and URL history (visited websites). Spytector keylogger also intercepts both sides of chat (messenger conversations) for the most used chat applications (AIM, ICQ, Yahoo Messenger, MSN Messenger).

In the case you need to monitor only specific window applications or visited websites, it's possible to create a keylogger filter so only the desired info will be written in the logfile.

Spytector "server" allows you not to only monitor applications ran and websites visited but to restrict the access to them. It's possible to create filters and the specified applications and websites will be completely blocked.

Spytector "server" is completely invisible on the user desktop and cannot be seen in the task manager.

By using advanced hooking and stealth techniques, Spytector key logger can be used in the same time with most firewalls and antiviruses installed on your computer.


<< back to top
Security
The logfile is strongly encrypted locally and can be received either encrypted or decrypted in your email and FTP accounts.

Spytector can be password protected. If the password is set, you won't be able to run it without using the password.

<< back to top
Hotkeys
The "server" can be uninstalled by using the hotkey which was set during the building process - the default hotkey is CTRL+SHIFT+F1. After using the hotkey, the keylogger will uninstall silently (sometimes a reboot may be required for complete uninstallation).

Make sure you set a hotkey when you build your keylogger, that's quite useful in the case you need to uninstall it.

<< back to top
Local Options
Keylogger Settings
On the Local Options you are able to password protect Spytector, in this case nobody will have access to it without knowing the password.

The interface (GUI) supports few languages (English, French, Portuguese) and skins that can be changed on the fly.

All the settings you use to configure Spytector can be saved, so the next time you run it you don't have to fill again all the necessary information.

By clicking Load Default Settings, all the current settings will be replaced with the initial (default) settings.

<< back to top
Basic Settings
Keylogger Settings
On the Basic Settings panel you are able to set the name for the "server", copy the version information from another program and also change the "server" icon.

The file version information can be copied from any executable and helps the keylogger to be more undetected. On the other hand, it could be exactly the opposite (the keylogger could become detected) if you copy the version information from Microsoft programs. Also, in the case you copy the version info from programs that escalate Administrator privileges (by example setup programs), when running the "server" you will see a prompt from UAC asking "Do you want to allow the following program to make changes to this computer?".

The icon of the "server" can be changed either with one of the built-in icons or with an external icon of your choice. The icons included in Spytector are small (16x16 and 32x32 pixels and 256 color depth), so it could be a good thing to use a bigger icon. There are few antiviruses that detect the programs with small icons, so a bigger icon (let's say more than 50kb) could help on this matter.

<< back to top
Email Settings
Keylogger Settings
If you want to receive the logs by email, you have to configure "Email Settings". You have to write an address of yours on the "Send Email From" field, and (if it's required) the password for authentication (the email login password), and another address of yours on the "Send Email To" field. Of course, you will receive the logs at the address written on "Send Email To". The "SMTP Address" and "SMTP Port" are mandatory and should be supplied by your email provider.

After you have filled in the required info, it's good to use the Test button to see if the settings are OK.

Spytector email feature works perfectly with port 465 (it uses a SSL connection). The most important thing is the email address on "Send Email From" and the SMTP. If those are working fine you can receive the logs to almost any email address (Gmail, Yahoo etc.). The email feature works fine with many email providers but for best results you should use a paid-for email account - the paid-for accounts are more reliable than the free ones. You can purchase email accounts from us or from somewhere else. Our email accounts are $7.95 per month and $70 per year.

The logs sent to your email address can be either encrypted or plain text, depending on the option you've chosen.

<< back to top
FTP Settings
Keylogger Settings
On the FTP Settings panel you should write the specific info needed for receiving the logs. After you have filled in the required info, it's good to use the Test button to see if the settings are OK.

The logs can be uploaded either in the root folder or in any folder you specify. If the folder doesn't exist, it'll be created by the keylogger.

The logs sent to your FTP address can be either encrypted or plain text, depending on the option you've chosen.

The regular FTP port is 21.

<< back to top
Server Options
Keylogger Settings
The Server Options panel gives you few choices to customize the "server" a bit more: server overwriting (the "server" can be overwritten by another "server" which is ran afterwards on the same computer), melting (the original "server" is deleted after the first run), disabling the System Restore, message box configuration (at the first run of the "server" a message is displayed), uninstalling after a specified number of logs sent or when a hotkey is pressed, access restriction, uninstall by checking a specific internet address (if the remote file exists - the address is valid - the "server" will uninstall itself).

The keylogger can be configured to be active after a specified time interval or after the computer restart.

Spytector "server" allows you to restrict the access to specific websites and applications. By clicking the Configure button a new panel shows up and you are able to set the filters for applications and websites. In the case of the applications you have to add the executable name to the proper list (by example if you add 'aim' then 'aim.exe' will be stopped). On the websites list you can add keywords (by example if you add 'porn' to the list then all the websites containing the keyword, like http://freeporn.com and http://porn-star.com, will be blocked).

<< back to top
Log Options
Keylogger Settings
On the Log Options panel you can enable the option for the keylogger filter. The keylogger can be active only when a specific window is focused and its title contains the specified keywords. This option comes in handy if you don't want to have the logs filled with junk data.

The dead keys and navigation keys (CTRL, ALT, SHIFT, ESC, PAGE UP, PAGE DOWN, HOME, END, UP, DOWN, LEFT, RIGHT) won't be included in the log if the "Clean Log" option is enabled (default setting).

The option for log formatting is enabled by default (whenever BACKSPACE is pressed the last trapped character won't be written to the log). If the Smart Keylogger checkbox is unchecked the log file will contain all the pressed characters and {BACKSPACE} keys.

Spytector keylogger is able to find and decrypt the locally stored passwords for newest versions of FireFox, Opera, Google Chrome, Internet Explorer, Safari, GoogleTalk, Outlook, Windows Live Messenger etc. The found passwords are included at the beginning of the logfile once in a boot session.

Spytector keylogger intercepts both sides of chat (messenger conversations) for many versions of the most used chat applications (AIM, ICQ, Yahoo Messenger, MSN Messenger). The whole messenger conversations are included in the logs only if you check the appropriate checkbox.

The URL history is included by default at the beginning of every log received. The default number of URL entries (visited websites) is 20. In the case you're not interested to receive such info just uncheck the appropriate checkbox.

According to your needs, the logs can be received either when they reach a minimum size (default is 30 KB) or at specified day intervals. The log delivery on a daily basis works better if the computer is connected all the time to the Internet. If the Internet connection is made automatically at boot (by example when the monitored computer is connecting to Internet through a router that is ON all the time), it is OK to use the daily log delivery. If the connection isn't made automatically, it's better to set the keylogger to send the logs at the specified size.

<< back to top
Log Viewer
Keylogger Settings
The logs can be viewed in a specially designed window included in Spytector, the Log Viewer. If the logs are received on your email address, the easiest method is to copy the email text body to the clipboard and use Paste Log Text button. If the logs are downloaded from your FTP account, then it's more convenient to use Load Log File button. It doesn't matter if the logs are encrypted or plain text, the Log Viewer can handle both types of log.

The different log sections are colored, so the user can easily see the PC activity. Initially, all the sections (Passwords, URL history, Boot, Keystrokes etc.) are put together, with the Passwords on top. From the upper right combo box, the user can choose different sections to view. It's possible to search the log for specific keywords and the search can be executed upwards, downwards, case sensitive and/or for whole words.

From the Log Viewer window, the formatted logs can be saved as RTF or HTML.

Also, in the case you don't use the email or FTP delivery options, it's possible to manually retrieve the local logfiles. On the bottom of Spytector's main window, near the Log Viewer button, is located the Retrieve Local Log option. As the name says, the button must be used to retrieve the local logs. By clicking it, a popup menu with 2 options appears and it's possible either to retrieve the local logs automatically or manually browse for the logs. The log files are stored under a path like "C:\Users\Your-User-Name\AppData\Local\Microsoft\Windows"). The log files have hidden attributes, so you have to make sure you see the hidden/system files.

<< back to top