The KeyGrabber Forensic Keylogger Cable is an ultra-discreet USB keylogger embedded in a USB extension cable. Extremely well disguised, it can be accessed as a USB flash drive for instant data retrieval.
$29.99 / €26.99
Manufacturer product number:
Gross weight (inc. packaging):
0.1kg / 0.1 lbs
The KeyGrabber Forensic Keylogger Cable is an ultra-compact USB keylogger hidden inside a USB extension cable. From the outside, the USB cable doesn't differ from any ordinary cable in common use, and draws no attention.
Passively monitoring a USB bus for keystrokes is a complex task, and the KeyGrabber Forensic Keylogger Cable does this better than any other solution on the market. The KeyGrabber Forensic Keylogger Cable implements a 32X waveform oversampling algorithm based on a sophisticated FPGA chip. This makes it a top-performer in terms of reliability, with a zero character drop-rate. It works with wireless keyboards (excluding some Bluetooth models), keyboard with integrated hubs, and all types of barcode scanners (including those with a fast keystroke generation speed).
The KeyGrabber Forensic Keylogger Cable is as easy to use as all it's predecessors in the KeyGrabber family, being best-sellers since 2005. This hardware keylogger works out-of-the-box by simply plugging it inline between the keyboard and USB socket. Accessing data requires pressing a predefined key-combination known only to the owner. The KeyGrabber Forensic Keylogger Cable has a few models varying by memory capacity, however even the entry-level 16 megabyte version is an equivalent of years of typing.
The KeyGrabber Forensic Keylogger Cable is as stealthy as a hardware keylogger can get. It leaves no traces on the target computer, and doesn't propagate anything in the local Wi-Fi environment. It works as a passive USB-tap device, and doesn't show up on the list of USB devices or use any drivers. Thus it cannot be detected by security and anti-virus software.
The Pro version is a multi-role security and pen-testing device. It works as a keylogger, but can also be switched to keystroke generation mode. Operating as a HID device it can generate a text-menu, making access to memory and configuration options more convenient. Moreover, it can also run keystroke-injection scripts thanks to a keystroke parser based on a simple scripting language. This makes it a perfect penetration testing tool, combining the functionality of a hardware keylogger and HID injector in a single slick device.