WOLFEYE KEYLOGGER

Program to secretly record all keystrokes on the computer.

*3-day trial version. Zip file password: wolfeye

**60 days money back guarantee. 5 PC licenses is included in the price!
No subscription!

Supports Windows 11, 10, 8, 7, Vista & XP

This software is a tool that can theoretically be used for illegal purposes. This is of course not allowed: The software may only be installed and run on your own devices. Use on third-party devices without the consent of the owner/user is prohibited!

What is Wolfeye Keylogger?​

Wolfeye Keylogger is computer monitoring software for PC. The program secretly records all keystrokes on the computer and saves them to a log file or sends them to a server for remote monitoring.

In this way it is possible to read all chat conversations, all e-mails and Facebook passwords and thus gain access to the accounts. You can also use the keylogger to control which websites have been visited. Finally it is possible to take regular screenshots/screenshots of the PC.

The log files are also sent to a server so you can monitor the computer remotely

Wolfeye Keylogger Logfile

Computer-Überwachungs-Software

Wolfeye Keylogger is computer monitoring software for PC. The program secretly records all keystrokes on the computer and saves them in a log file.

Chats, emails and passwords

In this way it is possible to read all chat conversations, all email and Facebook passwords and thus gain access to the accounts. With the keylogger you can also control which websites have been visited because these are also written to the log file.

remote monitoring

See keystrokes remotely via web browser!

Tutorial.

Step 1: Set an exception in the antivirus program

The first step begins even before the download: You have to select the download or installation folder and add it to the exception list of the antivirus program – this is important.

Because Wolfeye Keylogger is a surveillance software and therefore works like a „hacking tool“. For this reason, antivirus programs see the application as suspicious.

However, just putting the folder into which you will copy the application into the exception is sufficient, because the application only operates within this folder and does not copy anything into it or do anything else.

It is important that when choosing this folder – when choosing this path – we choose a folder on which every PC user has write rights. Because of course we want to use the application to be able to monitor any user on this PC.

And for this reason we should best choose a folder on C:\Users\Public or C:\Users\Public. Some examples are C:\Users\Public\Pictures, C:\Users\Public\Documents, C:\Users\Public\Music, C:\Users\Public\Videos …

I will choose one of these public folders – for example this C-user-public-video – and create the folder named winupdate there (the folder name can be anything):

We will copy Wolfeye Keylogger into the winupdate folder. First we will put this folder in the antivirus exceptions.

How to do this depends on which antivirus program you are using. If you want to know how your antivirus program works, send us an email and tell us which antivirus program you use. We will give you the instructions for setting up an exception in your antivirus program. There are antivirus programs in which the exception must be set in different places. Because, for example, there is a live scan and a general scan. So please send us an email if you have any questions.

I now show here how to set such an exception in the Windows Defender Security Center of Windows. I do this by typing here in the Windows search box, then Antivirus, and clicking Virus and thread protection:

Virus and threat protection opens and next I go to Virus and threat protection settings (thread and protection settings). A page appears, I have to scroll down and click on exclusions. And here I can add or remove exclusions:

And I can choose to put a specific file or folder in the antivirus exception. But I choose a folder because I want to add the whole folder. I click on it now and enter the folder „winupdate“. With this, the antivirus program will continue to scan everything normally, but skip one folder during the scan:

Schritt 2: Wolfeye Keylogger herunterladen

*3-day trial version. Zip file password: wolfeye

The download is a .ZIP file. Once downloaded, copy the .ZIP file to the winupdate folder we just placed in the antivirus exception. Right click on the .ZIP file and extract the contents of the .ZIP file to the winupdate folder. The password of the .ZIP file is wolfeye:

Now you can run the application by double clicking on the .EXE file:

When you run it for the first time, a Windows message appears. Here you have to click on „more information“ and „run anyway“. Of course, this message only appears the first time Wolfeye Keylogger is run:

Step 3: Set up / start Wolfeye Keylogger

Double-clicking on the Wolfeye application (.EXE file) will bring up the Wolfeye Keylogger control window. You can now press the „Share Screen“ button to start recording the screen. You know that all keystrokes are being recorded when the button turns red.

Keystrokes are now written to the „k3ys.html“ file. You can test this by starting Notepad or the browser and typing text into it. Pressing the „Open Logfile“ button opens k3ys.html:

Step 4: Set up Remote Keylogger

To start the remote keylogger, you have to press the „Enable Remote Logfile“ button. This turns red when remote monitoring is running. In this way, the k3ys.html file is regularly sent to the web server so that all keystrokes can be viewed remotely. The labeling of the „Open Logfile“ button changes to „Open Remote Logfile“ as soon as the k3ys.html file exceeds the size of 1kb:

k3ys.html is sent to the server as soon as the size of 1kb is reached – and then deleted again. The size of the k3ys.html file therefore always remains around 1kb if the „Enable Logfile“ button has been pressed and remote monitoring is switched on.

The keystrokes can now be viewed over the Internet using any browser by opening the URL of the log file. This URL is opened by pressing the „Open Remote Logfile“ button. Copy the URL and send it to your email address to open it on a remote computer.

Wolfeye Keylogger also links to the URL:

Step 5: Hide Wolfeye Keylogger

In order for the keyboard recording to run discreetly and secretly in the background, simply close the application by pressing Windows-X. The control window closes, but the software continues to work in the background and records everything.