Hooker 3.2

Lightweight keyboard activity spy. Highlights of the features: stealth mode; capture Unicode text; capturing of clipboard changes; capturing of currently used process; log to file, email or FTP; log file encryption; integrated log viewer.

Freeware
Windows (all)
427 KB
2,523
10
(21 votes)

Hooker is a lightweight keyboard activity spy. It allows capturing of all keystrokes made by the user, including any clipboard changes. Currently active process name and window title can be logged and used for filtering the captured data. It is Unicode aware, so characters generated in any language are going to be recorded correctly, even combining keys such as accents.

Advanced logging facility can periodically save all of the activity in a log file, send via email or upload to an FTP server. The program is completely hidden during normal operation and is accessible only with a secret key combination (and a correct password in "Pro" version).

What's New:

  • Reimplemented hook library to allow future improvements;
  • Moved most of the processing from hook library to the host application;
  • Fixed problem with detecting keyboard layout in 64-bit processes;
  • CTRL + KEY combinations are logged as <CTRL+KEY> tags;
  • Fixed handling of dead keys, they are no longer silently consumed;
  • Log hex code of unknown non-printable characters as <#XX>;
  • Better capturing of active process information;
  • Capturing of active window information;
  • Added option to provide debug log output;
  • Application no longer terminates on startup errors;
  • Allow filtering of captured data by process or window name;
  • Repeated keys are no longer buffered and displayed as <*X>;
  • Status bar panels are automatically resized for better fit;
  • Refactored settings window;
  • Fixed problem with incorrectly decoded Unicode data in the Log Viewer;

Note:

  • This application was no longer developed nor supported but its back online.

  • Downloadable archives are protected with a password "hooker" because they may be marked as dangerous objects by some anti-virus software, due to the nature of the application.