Anti-Keyloggers Edit

Some freeware Anti-virus, Anti-spyware, Anti-trojan will detect keyloggers by signatures. Anti-rootkits that detect rootkits using generic methods can only often reveal keyloggers because they can defeat the methods used by keyloggers to hide.

Hardware keyloggers cannot be detected by software methods.

There are different types of software keyloggers, including hooking keyloggers and kernel-driver keyloggers.

Kernel keyloggers are hard to detect and, when they are installed, they can be almost invisible - many are pretty much kernel rootkits. The best defense against kernel keyloggers is to stop them from being installed in the first place by blocking driver-installations using HIPS or limited user accounts..

Hook-based keyloggers can be more easily detected and most of the entries on this page are designed to work against them. Many HIPS also have the ability to block global hooks and, so, will stop hook-based keyloggers as well.

There are other, application-specific keyloggers, most commonly those that target browsers via browser plug-ins (BHOs, extensions) or even proxies for man-in-the-middle attacks.

Anti-Keyloggers Edit

  1. SpyShelter Free Anti-Keylogger (Dual layer protection: Anti-Keylogging module and keystroke encryption)
  2. DewaSoft's KL-Detector v1.3
  3. Keylogger Blocker - Free for the first 30 days
  4. Zemana AntiLogger Free

SpyShelter Free Anti-Keylogger is an "anti-keylogging, anti-spyware program" that "detects and block[s] dangerous and malicious programs". The application is no longer free, but offers system protection (HIPS), AntiKeylogger, Keystroke Encryption and AntiClipboard Capture. Likewise, Zemana was once free, but the free version has been discontinued, according to Zemana's website. <p data-parsoid="{"dsr":[2001,2201,0,0]}">KL-Detector works by trying to detect log files being created by the keylogger. It is probably not very effective except against the most basic keyloggers.


  1. Malwarebytes Anti-Malware Free
  2. SUPERAntiSpyware Free

Malwarebytes Anti-Malware Free "The free version of our anti-malware application is designed to clean out all types of malicious malware, including viruses, spyware, trojans, keyloggers, password stealers, dialers and more."»

SUPERAntiSpyware Free "Detect and remove Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers and many other types of threats." Note, however, the free version of SAS does not include premium (paid) real-time features which protect the user from malicious website activity at the moment infection might occur. Nonetheless, the free SAS can be put to good use in manual (user-initiated) disk searches, ferreting out instances of malware already on the system. Even the free version of SAS provides a user-editable "white list" of safe application files, to correct instances in which SAS flags a safe file as malware. »

BitDefender's QuickScanEdit

BitDefender's QuickScan "is an online tool which uses 'in-the-cloud' scanning to detect malware running on a PC very fast, usually in less than 60 seconds." It is intended as a quick second-opinion check before banking or shopping online.

"QuickScan only detects viruses which are active in memory or present in files that are run at system startup" and it will NOT remove any malware it detects. Supported browsers are: Internet Explorer, Firefox and Chrome.

BitDefender's QuickScan FAQs

Other, Passive Methods to Protect against Keylogging (will not detect) Edit

These will not detect any keyloggers if they exist but will make it difficult for them to log valuable data.
  1. DewaSoft's I Hate Keyloggers (nagware)
  2. QFXSoftware's KeyScrambler Personal (for Chrome, IE, Firefox, Opera, Safari & others)
  3. MyPlanetSoft's Anti-Keylogger
  4. NetworkIntercept's Free Anti-Keylogger (for Internet Explorer)
  5. MaxSecurity Lab's NextGen Anti-Keylogger Free (for IE, Firefox & Safari)

I Hate Keyloggers and MyPlanetSoft's Anti-Keylogger try to thwart keyloggers by deactivating any system-wide hook. This will prevent any existing hook-based keylogger from working. A few rare keyloggers like Martin's Undetectable Keylogger will not be blocked by either of them.

KeyScrambler encrypts users' keystrokes at the kernel-driver level as they enter the computer so that any keylogger planted in the operating system can log only the useless data. KeyScrambler employs advanced key-encryption algorithms and special decryption methods to protect user-inputs. KeyScrambler Personal, the free version of KeyScrambler, is limited to protecting browsers (Advanced Browser, AM Browser, AOL Explorer, AOL 9, Avant, Comodo Dragon, Comodo IceDragon, CometBird, Crazy Browser, Firefox, Flock, Google Chrome, Internet Explorer, K-meleon, Maxthon, MSN Explorer, Netscape, Orca Browser, Opera, Safari, Seamonkey, SlimBrowser, SR Iron Browser, TheWorld Browser, Palemoon, Lunascape, RockMelt, WaterFox, and Yahoo Browser).

Free Anti-Keylogger uses NetworkIntercept's Keystroke Interference. This "injects random data" between keystrokes.

Virtual Keyboards Edit

Neo&#039;s SafeKeys
  1. Oxynger KeyShield
  2. Neo's SafeKeys
  3. MyPlanetSoft's Mouse-Only Keyboard (MOK)
  4. MiloSoft's Virtual Keyboard
  5. NetworkIntercept's Virtual Keyboard
  6. Keylogger Beater (for Firefox)
  7. Keylogger Blocker Virtual Keyboard

First off, the free on-screen keyboard offered by Windows XP Accessibility Tools is useless against keyloggers because of its emulation of keystrokes (even in hover mode).

Oxynger KeyShield protects its keystrokes from keystroke logging, screen logging, mouse logging and clipboard logging. It is protected against hook
Keylogger Beater
based, API based and Kernel/Driver based keyloggers. It prevents taking its screenshot using screen logging programs and windows print screen function. It is also protected from video recording programs. Oxynger KeyShield provides excellent protection from mouse logging. Protection from mouse logging is accomplished by not using the common QWERTY layout for positioning keys in Oxynger KeyShield. Instead it uses different key layouts for each installation. Also Oxynger KeyShield does not use clipboard for transmitting keystrokes to target program.

To fool mouse-loggers, Neo's SafeKeys virtual keyboard launches with unpredictably variable width, height and screen-position and, with the click of a button, it can be readily resized and repositioned at any time. Passwords are entered into the virtual keyboard with point-and-click or hover mode and, then, inserted into the required password field with drag-and-drop: it does not use the clipboard at all. Version 3 is available and its improvements over version 2 include "great screenlogger protection" and "injection mode" (for those programs that do not allow the preferred "drag and drop").

MyPlanetSoft's Mouse-Only Keyboard (MOK) provides a virtual keyboard with some clipboard-protection and protects against hook-based keyloggers using the same method as MyPlanetSoft's Anti-Keylogger.

Keylogger Beater, an add-on for Firefox, is more than just a virtual keyboard with hover mode, providing as it does a second, completely different method to thwart keyloggers. Using a simple cypher system, this method allows the user to more securely enter login details with the normal keyboard.

Keylogger Blocker features a Virtual Keyboard as a supplement to the keylogger scanner and remover features.


LSN Password Safe
managers are designed to maintain records of password or login details securely within encrypted databases, each locked with a master password or a key file. Some password-managers can provide a more secure way of entering login details (eg. drag-and-drop) that might thwart keyloggers.
  1. LSN Password Safe

LSN Password Safe (discontinued but available from is a free password-manager with anti-keylogging measures that can work portably from a USB flash drive. "[It] is easy to use ... with integrated spyware protection. Maximum attention was paid by creation of LSN Password Safe to protect against spyware."

Other, Non-Technological Methods Edit

How to Login from an Internet Cafe without Worrying about Keyloggers observes that you can fool most keyloggers by "alternating between typing the login credentials and typing characters somewhere else in the focus window. For example, type one letter of your password, then click somewhere else within the same focus window (it must be the same window) and type some random characters, then click back in the password area and type the next character, and so on."»

Other similar methods include typing a series of random characters in the form field, highlight them and, then, type the correct information. This will cause the highlighted random characters to be replaced with the valid characters. The idea here is to avoid using the delete key. Or you could assemble your password by cutting and pasting different strings.

Another trick suggested by Ian Richards is to "enter a character by holding down the Alt key and using the numeric keypad. For example the letter 'a' can be entered by ALT 123."»

He also recommends a combination of all these methods to assemble some of the password plus the use of a virtual keyboard like Neo's SafeKeys (portable) for the rest of the password affords even more protection, depending on how frequently screenshots are taken. Copying and pasting passwords from a password-manager to bypass the keyboard might be effective provided there is some protection of the clipboard.

Testing Vulnerability to (Some) Keylogging MethodsEdit

Anti-Keylogger Tester II
Anti-Keylogger Tester (AKLT) is a small (169KB) single-file program that, with its nine tests (7 keylogging & 2 screen-capturing), allows one to check the efficacy of anti-keylogging software.

Trusteer's RapportEdit

Trusteer's Anti-Keylogger Myths argues against the effectiveness of various anti-keylogging measures (virtual keyboards, graphical passwords, password-managers, keystroke-dynamics and even one-time passwords) to conclude that keystroke-encryption as used in its Rapport software provides the strongest defence against keyloggers.

Rapport is a "lightweight security software" intended to provide an extra layer of protection when banking online. Trusteer says: "By locking down customer browsers and creating a tunnel for safe communication with the online website, Rapport prevents Man-in-the-Browser malware and Man-in-the-Middle attacks. Rapport also prevents phishing via website authentication to ensure that account credentials are passed to genuine sources only."»

Despite its being "lightweight", there are suggestions of high CPU-usage. Still, given that some online banks encourage and endorse its use, it is definitely worth considering. For Windows, the supported browsers are Internet Explorer, Firefox and Chrome; for Mac, they are Firefox and Safari.»

And Finally ...Edit

Trusteer's Anti-Keylogger Myths says: "Password managers can be easily bypassed using keyloggers that reside inside the browser ... known as man-in-the-browser malware or malicious browser plug-ins." It adds: "The browser plug-in technology grants the plug-in a lot of privileges, such as full access to the DOM (which is the internal representation of the page currently displayed), and subscription to browser events (such as 'navigation', 'page load' and 'form submission'). This makes it very easy for a malicious plug-in to get hold of the credentials."

One might then infer a rather simple and straightforward precautionary measure against man-in-the-browser attacks: for general surfing, use your favourite browser with all your favourite plug-ins/add-ons/extensions/BHOs; for security-critical purposes such as online-shopping and -banking, use a different, portable browser (eg. Firefox, Iron, Opera, Slimboat) with an absolute minimum of trusted plug-ins installed and enabled (and, of course, maintain the security of the browser and any such plug-ins by keeping them updated to the latest versions).

Resources to learn about keylogging and antikeylogging Edit

  1. Introduction to Spyware Keyloggers -
  2. How to Login from an Internet Cafe without Worrying about Keyloggers -
  3. Keyloggers: How They Work and How to Detect Them -
  4. Sandboxie and Keyloggers -
  5. Trusteer's Anti-Keylogger Myths -

This article is part of the Lists of Freeware Security Software: Malware Control series.

Freeware Anti-Viruses | Freeware Anti-Spyware | Freeware Anti-Trojans | Freeware Anti-Keyloggers | Freeware Anti-Rootkits | Freeware Firewalls | Freeware Behavior blockers | Freeware Sandboxes | Freeware Virtualization | Freeware Security analysis tools | Freeware Hardening tools | Freeware Blocklists | Freeware security services (excluding virus scanners) | Freeware Anti-Phishing | List of portable tools | List of unclassified tools

Related : Lists of online scanners