Review of KGB Spy - a program for logging user actions. KGB Spy (unique "keylogger") Download all programs used by KGB

Briefly about:
KGB Spy(unique "keylogger")

The functionality of the program allows you to set the invisible mode of operation of KGB Spy, so that no one will guess that a real "keylogger" is watching it. KGB Spy imperceptibly monitors the operation of the computer: records information entered from the keyboard, data from the clipboard, monitors visited sites. The information collected during monitoring is saved in a database to which only you have access. You can get on your e-mail letter with detailed information about who, when and what was doing on the computer. You just need to check your mail from time to time.

Key features of KGB Spy
* Visible / invisible mode
* Interception of pressed keys on the keyboard
* Clipboard monitoring
* Record screenshots (screenshots)
* Monitor visited websites
* Email notifications about a set of forbidden words
* Very user-friendly and intuitive interface
* Sending logs to E-mail and FTP

We are going to build a build with a silent installation on the system, and this is how we start:
1. First, download the program http://www.multiupload.com/OQGKCMM1UU (medicine inside)
2. Install KGB-Spy, select KGB Employee Monitor in the versions window

3. Setting and description:
In the first start of the program, turn off the introduction of logs (such a red button)

Users - your computer's account should be written here

Uncheck all the boxes in Monitoring

Pressed Keys - put a checkmark where necessary and click apply

Screenshots - check how long it takes to take a screenshot, you can take a screenshot when you open a new window
Screenshot type of active window and Full Screen- we clean the necessary
The quality of the screenshot, we will check it if you want (if the quality is maximum and the Internet is a victim of "not very" the logs will go with a delay)

Skip program activity and clipboard

Visited Websites - select the type of interception, you can take a screenshot of the site

Invisibility -
Hot keys - put any combination
Magic Word - Empty

Check the box "Run in hidden mode"
Check the box "Hide everywhere"

Optional password (password so that no one can change the settings)

Sending - Sending is a mile and FTP, I think it's not worth explaining how to set it up, everything is clear here, after setting up we press "Test" so that there are no doubts

Alarm signal - no need)

Filters - skip (customize if desired)

Update - uncheck "Check for update automatically"

4. Assembling the assembly:
Go to the folder where KGB Spy was installed (you need to open hidden folders)

copy everything to separate folder, delete unnecessary (delete highlighted in the screenshot)

Copy the MPKView.exe file to a separate folder, for example, to the desktop, after which we should have a remainder of 8 files in the folder. Now we go for the key, it lies in C: \ Documents and Settings \ All Users \ Application Data \ MPK \ here it is, folder MPK copy it to our folder with all the files.
The MPKView.exe file can then be thrown to the victim in System32 if there is access to the computer on the computer, see if there is no access, you can delete it nafik

We archive it like this:

Now we have the "conf.exe" SFX archive, now we see everything in the folder and again in the SFX archive with the following settings:

It seems everything, the assembly is over)

Cons of a spy:
Doesn't bypass uac
I noticed that some have Avast, then key interception does not work, only a list of processes comes
In programs, where to cost anti-interception of keys - also does not bypass

Like everything) do not judge strictly my first article) probably a lot of grammatical mistakes)

Several screenshots with logs in the mail

The article is provided solely for informational purposes.
The use of this article entails liability under applicable law.

The functionality of the program allows you to set an invisible mode of operation, so that no one will guess that a real keylogger is following him. KGB Spy at work of the computer: records information entered from the keyboard, data from the clipboard, monitors visited sites.

The information collected during monitoring is saved in a database to which only you have access. You can receive a letter on your e-mail with detailed information about who, when and what was doing on the computer. You just need to check your mail from time to time.

If your computer is used not only by you, but also by your child, the problem becomes full-length. There are enough resources on the Internet that are categorically inappropriate for viewing by children.

Besides, in recent times there has been an increase in the number of crimes committed against children by persons using Internet chat rooms to seduce minors. It is extremely difficult to restrict a child's access to dubious resources, and it is almost impossible to deny access to chats. The optimal solution can be the use of a monitoring system for your child's actions on the computer and on the Internet.

Your firm's sales are down 50% and best manager began to behave inappropriately sometimes? When you enter, he frantically presses something on the keyboard! If you need to control the use of computing resources at the workplace by employees of your organization, you cannot do without a computer control and monitoring system.

There are both hardware solutions, such as hardware and software systems that combine the use of a simple video camera with the supplied software... Such solutions have both advantages and a number of disadvantages, starting with their high cost and ending with their incomplete compliance with the task of tracking the efficiency of operation, as well as the misuse of computing equipment.

Provides a convenient, intuitive interface for tracking user activity on your computer. The product is able to track and save keystrokes to a file on your hard drive, allowing you to monitor the productivity of workers in the workplace or ensure the safety of your child in chats.

Or has it recently begun to seem to you that your beloved is from you? Its ICQ does not store a single message, all files from the computer were transferred to a USB flash drive, it works on the Internet only when you are not around! All visited websites are also added to the report along with illustrations - instant screenshots!

You cannot understand what is going on. You are not offered for a child, loved one or an employee - you are offered a reliable assistant in obtaining necessary information- a spy program.
A unique feature of the product is the system for responding to the input of certain keywords or phrases.

May send you an E-Mail or notify you in any other way in case the user enters keyword from the list you specified.

Spy KGB Spy allows you to set an invisible mode of operation, so that no one will guess that a real keylogger is watching him. KGB Spy imperceptibly monitors the work of the computer: records information entered from the keyboard, data from the clipboard, monitors visited sites.

How to detect and remove spyware KGB Spy.

How to protect your personal information with Mask S.W.B from one of the most popular keyloggers - KGB Spy.

How computer user with no knowledge of information security, detect a spy hidden in your system, and protect yourself from surveillance without removing the keylogger from your computer in order to mislead the one who is following you? And how to remove a spy Kgb Spy if you decide to do this? Let's consider the situation using the example of a common keylogger KGB spy and programs Mask S.W.B which creates a secure platform for the user.

After launching the anti-spyware Mask S.W.B press the "System Processes" button.


In the system processes window, you can see all running processes, except for hidden ones.

To see if you have programs on your computer that hide themselves, click the "Hidden Processes" button.


In the Hidden Processes window, scroll down to the bottom. All hiding programs (rootkits) will be highlighted in red.


In the picture above, we see a spyware called KGB spy... This keylogger is configured to hide its actions and monitor the user.

If you want to remove Kgb Spy, select "Open folder with application" in the context menu.


In the window that opens, uninstall the application and the spyware will be removed.


If you just want to hide your actions from the keylogger and thereby mislead the one who is following you, then enter the platform by clicking the button with the program name, as shown in the picture above.

Within the protection platform, those programs that hide themselves from the user (rootkits) can be seen simply in the process window.


Program Mask S.W.B creates a safe environment in which you can do everything, but user behavior becomes out of control for spyware.


Spies will not be able to see your actions performed in a secure platform, which means that it will not be possible to transfer information about them to their masters either. Mask S.W.B protects from removing video from the monitor screen, from taking screenshots, does not allow receiving data from the keyboard and clipboard. In addition, it hides the sites you visit and other information about your activities.

If you find a spy that your wife or your husband (well, or your boss at work) assigned to you, do not rush to remove him. Think: it might be better for them to think that you are not doing anything unknown to them on the computer, since the spy will be clean. In the meantime, you can in the platform Mask S.W.B do what you want.

In the picture below, we see that the KGB spy, after the performed actions in the mask S.W.B platform, could not fix anything.


The cloaking program hides the user's actions from all existing ones. this moment spies. With its help, you can detect and eliminate computer spyware that work at the level of kernel system drivers and are invisible to anti-virus programs.

Download the anti-spyware program Mask S.W.B and check if you are being monitored by KGB spy

Our library of examples of detecting and neutralizing spyware has already accumulated a lot of articles, and we decided to classify this material.
The classification is based on the subjective assessment of the technical specialists of our test laboratory. As we plan to continue testing popular spyware programs in the future, we believe that this classification will help COVERT users and our website visitors to better understand the location of each spyware in the mosaic of modern threats.

We give each spy three ratings:
The first is design and functionality... The higher the score, the more possibilities provides a program to steal data and track the user.
The second is secrecy within the system.... How difficult it can be to detect it on a computer. The higher the score, the better program hides himself.
Third - evaluates the protection of a spy against antispyware and the difficulty of neutralizing it... The higher the score, the more diligently the program clings to its existence on the computer and the more steps need to be taken towards it. complete removal... Some programs cannot be removed by simply erasing the file folder from the disc.

- RLM: 5/5/4

VkurSe spy for secret monitoring of all user actions on the computer and sending the collected data to a special server. Provides the ability to secretly monitor the computer online, takes screenshots of the screen, intercepts keyboard input, clipboard, etc.

- RLM: 1/1/0

Windows Spy Keylogger is a fairly classic example of a keylogger - it captures all keyboard input and saves it to log files. It has an invisible mode, practically does not consume the resources of the operating system, is easy to install and can be installed on a computer without administrator rights.

- RLM: 3/6/1

Spytector works stealthily on a computer, saves passwords that were entered in browsers and instant messengers Internet Explorer, Google Chrome, Opera, FireFox, Safari, Outlook, GoogleTalk, Windows Live Messenger and other applications. The keylogger can intercept entire chats in popular messengers- MSN Messenger, Yahoo Messenger, ICQ, AIM. The intercepted information is encrypted by Spytector Keylogger and sent by e-mail or at FTP server.

- RLM: 8/3/2

JETLOGGER allows you to monitor the user's computer activity, collects information about running programs ah, sites visited and key combinations used, structures the received data and displays them in the form of diagrams and graphs. You can enable automatic creation screenshots at regular intervals. Hides the fact of collecting information about activity on the device.

- RLM: 4/0/1

Yaware.TimeTracker is a system for tracking working hours and evaluating the effectiveness of employees' work at the computer.

- RLM: 5/2/3

Award Keylogger is a popular spyware program that is described on many sites as a powerful real-time tracking tool with rich functionality. But we were not able to see all of the listed functionality, although we tested the latest fully functional version. The program turned out to be not much better than the average spy.

- RLM: 5/0/0

Real Spy Monitor is designed to track activity on the computer and allows you to save information about running programs, open files and windows, take screenshots, monitor which sites are visited by users, intercept and save keyboard input.

- RLM: 5/1/1

LightLogger has a fairly standard set of functions - it tracks visited websites, takes screenshots at a given frequency, intercepts keyboard input in applications, browsers and e-mail, remembers all running programs, copies the contents of the system buffer.

- RLM: 7/1/0

REFOG Personal Monitor will provide complete control over the system, logs any keystrokes. In addition, he periodically takes screenshots so that the observer has a complete picture of what is happening on the computer. All reports are sent to the specified e-mail. The work of the spy is invisible on the computer: it does not impersonate itself and consumes very few system resources.

- RLM: 5/3/3

TheRat can be installed on a computer using social engineering. In addition to traditional keylogger functions, the program can track actions in application windows and respond to words, as well as take screenshots of the screen each time you press the Enter key. A feature of a keylogger is work on the principle of disembodied viruses.

- RLM: 6/2/1

Snitch collects data about the activity of users and transmits them to its server, from which they are already sent to the control module and displayed in its interface.

- RLM: 2/0/0

Hide Trace is a typical representative of screenshots, who monitors user actions, creating a detailed report open windows by taking screenshots.

- RLM: 6/8/6

WebWatcher records all the activity taking place on the PC: emails, messages from instant messengers, information about visited sites, activity on Facebook / MySpace networks and everything that the user types in real time. Captures screenshots and tracks everything search queries... All collected information is sent to special servers, where the observer can view the results of the surveillance remotely.

- RLM: 6/0/2

DameWare Mini Remote Control Server allows you to connect and control remote machines via the Internet or a local network. Can covertly, imperceptibly for the observed, control all his actions.

RLM: 7/2/2

Kickidler - The program has good functionality, but it is easily detected and removed. There is a function of blocking the entrance to the secure COVERT platform, which is easily bypassed by means of a masker.

- RLM: 3/1/0

Total Spy - the interface is extremely simple, the program is small and does not affect system performance. But the functionality in the program is only basic.

- RLM: 7/8/5

PC Pandora- hides in the system and controls the entire computer and Internet traffic. Takes screenshots, receives keyboard input, actions on visited websites, email, instant messaging messengers and a lot of other information collects about the user's work. The program does not have a folder in which it stores its data. Everything is loaded into operating system and each new installation to one and the same computer or to another computer with new file names.

- RLM: 5/7/4

Micro Keylogger- a well-hidden spy program that is not visible in the Start menu, in the taskbar, control panel-programs, process list, Msconfig launch list and in other places on the computer where it is possible to monitor running applications. It does not show signs of presence and does not affect the performance of the system; it secretly sends a report to an e-mail or FTP server. Its activity is conducted through DLLs.

- RLM: 4/0/0

Expert Home- a multifunctional program for covert surveillance and detailed recording of all actions performed on a computer with a remote monitoring function, which allows you to view reports and screenshots anywhere, from any device, with Internet access.

- RLM: 7/0/0

Monitors the remote computer in real time, takes pictures of the user from the computer's webcam, records sounds in the room where the computer is installed, views file system, remotely downloads files, monitors and removes system processes, and other standard spyware functions.

- RLM: 5/1/1

System Surveillance Pro provides everything you need to monitor your PC in stealth mode. The utility logs text input, instant messages, applications used and sites visited, and also takes screenshots at a specified time interval or by event.

RLM: 3/0/0

KidLogger PRO, this is an open source keylogger that can record sound from a microphone, take screenshots. Delivery of logs / screenshots is possible by mail, or to the manufacturer's website, where they can already be viewed. It can also just store the logs with screenshots locally.

- RLM: 7/0/0

Remote Manipulator System - remote monitoring and control, allows you to connect to remote computer and operate it as if you were sitting directly in front of its screen.

- RLM: 6/2/1

Spy NeoSpy - a program for tracking your computer, allows you to conduct hidden monitoring of the system. Tracks all actions performed by users on the monitor screen, via the Internet from a computer, smartphone and tablet.

- RLM: 6/5/3

SoftActivity Keylogger monitors and records all user activities on the computer.
It works stealthily and unnoticed even for savvy users, no process in the task manager, no files can be seen in the system.
The configuration utility and uninstall option are password protected.

- RLM: 4/1/0

Snooper - an audio spy designed to record sounds that are picked up by a microphone connected to a computer, does not appear in the tray in recording mode, and is not visible in the list of processes in the manager Windows tasks... Until the microphone picks up sounds, the spy remains in sleep mode.

- RLM 5/0/0

The Best KeyLogger is a program that allows you to always have complete control over your computer.
The program allows you to read the entire history of actions on your computer in your absence.
With this program, you can view the chat logs, as well as mail and see which sites the user has visited.

- RLM: 5/1/1

SpyAgent is a program for complete control over user actions. Monitors system performance, including recording keystrokes, running programs, opening files, and more. Allows you to record all online activity - FTP, HTTP, POP3, Chat and other TCP / UDP communications, including visited websites. Takes screenshots, sends the collected data to the specified e-mail, it is possible remote control program.

- RLM: 6/2/0

Ardamax Keylogger - takes screenshots, intercepts clipboards and keystrokes on the keyboard. The spy has a hidden mode and it is not visible in the task manager. The program creates a log of all actions for further analysis.

- RLM: 8/1/0

Spyrix Personal Monitor allows you to conduct hidden control over any activity on your computer - in in social networks(VKontakte, Odnoklassniki, Facebook, etc.), chatting and e-mail, website visits and inquiries search engines(Yandex, Google). Spyrix Personal Monitor is designed for centralized monitoring of all user activities.

- RLM: 2/6/6

All In One Keylogger logs all keystrokes, including specific language characters, conversations and conversation messages, passwords, email, clipboard information, microphone sounds, screenshots, Internet activities. The spy does not appear in running processes.

- RLM: 8/6/7

Mipko Personal Monitor - monitors activity on the computer, monitors what sites are visited on the Internet, saves on HDD all user actions - pressed keys, visited sites, launching applications, screenshots. Not visible when working in stealth mode standard means system and does not appear in the process list. It works absolutely imperceptibly, like invisible, is friendly with antiviruses and in 95% of cases remains undetected.

- RLM: 3/1/0

Free Keylogger Remote is capable of intercepting keystrokes and copied text from any application. It can also record the names of running applications, visited websites, take screenshots at a given period of time. The spy operates in stealth mode and cannot be accessed. There is a function of remote monitoring and sending daily reports by e-mail.

- RLM: 7/1/0

SpyGo is a software package for hidden monitoring and tracking user activity on the computer. It is controlled remotely and allows for real-time surveillance. Works in hidden mode and remains invisible during monitoring.

- RLM: 3/1/0

The hidden agent Actual Spy is able to monitor all events occurring in the system: intercept all keystrokes, determining the register and Russian layout, take screenshots (screenshots), remember the launch and close of programs, monitor the contents of the clipboard, record Internet connections, register visited sites and much more.

- RLM: 5/1/1

Elite Keylogger - designed for secret monitoring of all types of user activity. The keylogger's capabilities include tracking all types of correspondence from ICQ to e-mail, websites visited by users, typed passwords and programs used. The spy generates screenshots of the user's work screen. It can send a report on user actions to an e-mail after a certain fixed period of time.

- RLM: 6/0/2

Using the Power Spy utility, you can take screenshots from the screen at regular intervals, record keyboard strokes, and visited Internet pages. You can also view mail messages read at Microsoft help Outlook and Microsoft Outlook Express and documents opened in Word and Notepad. The program, according to the specified parameters, sends a report to E-mail or writes it to a hidden log file.

- RLM: 6/5/5

The STAKH @ NOVETS software package is designed to track computer network enterprises. She gives complete information about each employee. Monitoring of the company's personnel can be carried out in a completely hidden mode.

- RLM: 6/0/3

StaffCop monitors running programs, applications and websites on work PCs. Intercepts messages in ICQ, Skype, e-mail and other messengers. Takes screenshots of the monitor screen, records keystrokes and much more, which is included in the concept of "computer control".

(KGB) - RLM: 7/1/0

KGB SPY is one of the most popular programs designed to spy on users personal computers... It intercepts and saves a detailed log of user actions on the hard disk, takes screenshots of the screen, records the launch of the software, etc.

- RLM: 1/1/0

Punto Switcher, designed to change keyboard layouts in automatic mode on the computer. At the same time, it can be used as a keylogger if certain configuration changes are made.

KGB Spy is a spy for keyboard. Working in an invisible mode, the program does not show its presence, respectively, the secret of surveillance is kept on high level... It will write down the information that was entered from the keyboard, copy information from the clipboard, keep track of which Internet sites were visited when using a personal computer.

The information collected during monitoring will be saved by the application in the database, to which only the user who installed it has access. The setting of sending a report on custom actions by e-mail is available. The report displays the most detailed information. The product is able to "remember" the screenshots taken. On the mailbox a signal will come if one of the users typed a forbidden word, as well as notifications for other reasons.

Download for free the full Russian version of KGB Spy from the official website without registration and SMS.

System requirements

  • Supported OS: Windows 7, 10, 8.1, 8, Vista, XP
  • Bit depth: 32 bit, x86, 64 bit