Basta baixar o arquivo zip extraí-lo e manter os arquivos em um disco portátil, depois de ligar a qualquer PC basta executar o regedit.exe e agora, quando a vítima pressiona quaisquer teclas pressionadas ele será armazenado em event.txt arquivo no...
- Inicio
- Invisible Hacker
- Utilitários de sistema
Aplicativos vistos recentemente
Automation Batch Tools 27 Jan 15
Change Case Of File Content To Proper, Upper, Lower & Sentence Software 1 Jan 15
Database Application Builder 10 Apr 15
Trace Converter for SQL 2005 25 Jan 15
OpenLink Lite ODBC Drivers for Postgres (64-bit) 4 Mar 16
Bytescout PDF To HTML SDK 15 Aug 18
MS Access Import Multiple Text Files Software 16 Apr 15
Datatrieve Online Backup System 30 Oct 15
GroupDocs.Conversion for Java 20 Jan 15
PHP With IIS 21 Jan 15
Software Popular
Portable Keylogger 9 Dec 14
Novo Utilitários de sistema Para Invisible Hacker
Aplicativos vistos recentemente
Automation Batch Tools 27 Jan 15
Change Case Of File Content To Proper, Upper, Lower & Sentence Software 1 Jan 15
Database Application Builder 10 Apr 15
Trace Converter for SQL 2005 25 Jan 15
OpenLink Lite ODBC Drivers for Postgres (64-bit) 4 Mar 16
Bytescout PDF To HTML SDK 15 Aug 18
MS Access Import Multiple Text Files Software 16 Apr 15
Datatrieve Online Backup System 30 Oct 15
GroupDocs.Conversion for Java 20 Jan 15
PHP With IIS 21 Jan 15
Software Popular
Portable Keylogger 9 Dec 14