Keystroke Guardian (Keylogger) : A Major Project Report On
Keystroke Guardian (Keylogger) : A Major Project Report On
(Computer Engineering)
By
University of Mumbai
Academic Year 2024-2025
CERTIFICATE
Project Guide
(Dr. Prachi Gadhire)
Principle
Head of Department (Dr. Shashank Divgi)
(Dr. Prachi Gadhire)
Major Project Approval
Examiners
______________________
_______________________
Date:
______________ _________________
______________ __________________
Date: -
ACKNOWLEDGEMENT
There are at times in such projects when the clock beats you time and again and again you run
out of energy and you just want to finish it once and forever. At such time a number of people
have generously given helpful comments and support during the preparation of this project.
They help us in every difficult step due to which our burden has been made simpler.
We would like to express our gratitude and appreciation to all those who gave us the
possibility to complete this project and this report. I and my team thank our head of
department Dr. Prachi Gadhire for giving us the accessory environment to acquire
knowledge and skill. A special thanks to Dr. Prachi Gadhire Mam, whose help, stimulating
suggestions and encouragement, helped us to coordinate our project especially in writing this
report. We wish to express our sincere thanks to Dr. Shashank Divgi, Principal, Dilkap
Research Institute of Engineering and Management Studies and would like to acknowledge
specifically for giving guidance, encouragement and inspiration throughout the academics.
We would also like to acknowledge with much appreciation the crucial role of the staff of
Computer Laboratory, who gave the permission to use all required machinery and the
necessary material to complete the report special thanks goes to our friends, who gave
suggestions about the source code.
Hammad Bubere
Aftab Choudhari
Vishwakarma Nilesh
Date:
Place:
TABLE OF CONTENTS
ABSTRACT
1 INTRODUCTION 1
1.1 Background
2 LITERATURE SURVEY 7
3 OBJECTIVES 13
4 SYSTEM ANALYSIS 16
5 METHODOLOGIES 24
6 RESULT 27
7 FUTURE SCOPE 32
8 CONCLUSION 35
9 REFERENCES 37
LIST OF FIGURES
4 PS/2 Keylogger 17
5 USB Keylogger 17
7 Checkbox 29
8 Stop Application 30
11 Help page 31
ABSTRACT
Keystroke Guardian is a tool designed to monitor and record all keyboard activity on a target
device. This type of software, often called a keylogger, captures keystrokes made by the user,
including typed text, passwords, and other sensitive information. Typically, keyloggers are
used for monitoring user behavior, but they also have the potential for malicious exploitation.
Keystroke Guardian offers features such as real-time logging, data storage, and activity
analysis.
While keyloggers have a valid role in parental control, corporate security, and forensic
investigations, their use is often controversial due to privacy concerns and the potential for
misuse. Ethical usage should involve proper consent, notification, and compliance with legal
regulations.
The Guardian keylogger differs from traditional keyloggers by adding encryption and secure
storage features to protect captured data from unauthorized access. It also includes alert
mechanisms to inform administrators of suspicious activity and allows for granular control
over monitoring, ensuring that only authorized actions are tracked.
The main purpose of keyloggers is to tamper with the chain of events that occur when a key is
pressed, and information is displayed on the screen as a result of the keystroke. Keyloggers
can be used for both lawful and illegitimate objectives, depending on the user who is utilizing
it. Keyloggers for systems, i.e., for identifying fraudulent users, can be used by system
administrators. Keyloggers can help a computer forensics analyst examine digital files more
effectively. Keyloggers are extremely useful for keeping track on ongoing criminal activity.
KEYSTROKE GUARDIAN (KEYLOGGER)
CHAPTER 1
INTRODUCTION
DRIEMS 1
KEYSTROKE GUARDIAN (KEYLOGGER)
INTRODUCTION
1.1 Background
Software Key loggers, also known as keystroke loggers, record the keys hit on a device and
save them to a file, which is then accessed by the person who deployed the malware. A key
logger can be either software or hardware. A hardware keylogger is a device that connects
your keyboard to your computer. Keyloggers can be connected directly to the keyboard and
the computer through manually using one of two approaches. PS/2 and the USP keylogger are
two examples of this method. Acoustic keylogger, unlike hardware keyloggers, analyses the
sound of individual keystrokes is recorded. To react to the sound of the user's typing, special
equipment is needed. The sound of the keyboard was picked up from hundreds of feet away
using a parabolic microphone, which was designed to record over a long distance The main
goal of this wireless keylogger is to intersect broadcast packets from a wireless keyboard that
engage a 27 MHz RF link to transfer translated RF keystroke characters. It keeps track of
keystrokes, saves them in a secure location, and subsequently sends them to the keylogger's
author.
DRIEMS 2
KEYSTROKE GUARDIAN (KEYLOGGER)
It’s worth noting that most keyloggers are developed in Objective-C due to its ease of
implementing the necessary functionality, as it is a native programming language.
In the modern digital age, where computers are integral to both personal and professional life,
the importance of understanding cybersecurity tools and threats cannot be overstated. One
such powerful yet controversial tool in the cybersecurity landscape is a Keylogger. A
keylogger (short for keystroke logger) is a type of surveillance software or hardware designed
to record every keystroke made on a computer or mobile keyboard. While it is often
associated with malicious intent, keyloggers are also used legitimately for monitoring and
auditing activities.
Keyloggers have drawn significant attention from researchers, IT professionals, and ethical
hackers due to their dual-use nature. They play a crucial role in penetration testing, user
behavior monitoring, parental control, and employee surveillance. At the same time, they
pose a serious threat when used without the user’s consent, such as in identity theft,
credential harvesting, and espionage.
This project aims to explore the design, development, functionality, and ethical
DRIEMS 3
KEYSTROKE GUARDIAN (KEYLOGGER)
System-level programming
Background services
This project not only deepens technical knowledge but also promotes awareness about
cybersecurity threats and defense mechanisms.
With the rise in cybercrime, understanding how keyloggers work is essential for cybersecurity
professionals. This project covers both the technical and ethical dimensions of keyloggers,
making it relevant for students pursuing degrees in:
Computer Science
Information Technology
Cybersecurity
Software Engineering
DRIEMS 4
KEYSTROKE GUARDIAN (KEYLOGGER)
By working on this project, students can appreciate the fine line between ethical monitoring
and malicious spying. The application will be developed purely for educational and ethical
purposes.
One of the most critical aspects of this project is understanding the ethical implications of
DRIEMS 5
KEYSTROKE GUARDIAN (KEYLOGGER)
keylogging software. While it can be used for legitimate purposes, such as employee
monitoring or parental control, unauthorized keylogging is illegal and considered a serious
breach of privacy.
The application should be used only on systems the user owns or has permission to
monitor.
The project report includes a detailed section on legal and ethical usage.
Any deployment must comply with local cyber security laws and regulations.
Students are encouraged to study relevant laws such as the Information Technology Act
(India), Computer Fraud and Abuse Act (USA), and GDPR (Europe) before testing or
deploying any keylogger software.
DRIEMS 6
KEYSTROKE GUARDIAN (KEYLOGGER)
CHAPTER 2
LITERATURE SURVEY
DRIEMS 7
KEYSTROKE GUARDIAN (KEYLOGGER)
LITERATURE SURVEY
Proprietary, limited
Commercial parental and employee
Refog Keylogger customization, privacy
monitoring with stealth features.
concerns.
DRIEMS 8
KEYSTROKE GUARDIAN (KEYLOGGER)
DRIEMS 9
KEYSTROKE GUARDIAN (KEYLOGGER)
solely use Python 3. (version 3.10.7). Multiple modules, such as pynput, smtplib, urllib,
multiprocessing, date time, as well as email Message, will be implemented by me. These
modules are not standard Python modules and must be installed. I’m planning to write
software to monitor keystrokes on the keyboard and save them to an output file. To expand
the project, I will also include a feature that will periodically (every 60 seconds) check for an
internet connection. If one is found, the logs will be transmitted immediately to an email;
otherwise, keystrokes will be recorded.
DRIEMS 10
KEYSTROKE GUARDIAN (KEYLOGGER)
supported by the ability of human resources, Keylogger is a tool that most developed
because this application is very rarely recognized a malicious program by antivirus,
keylogger will record all activities related to keystrokes, the recording process is
accomplished by using string matching method. The application of string-matching
method in the process of recording the keyboard is to help the admin in knowing what
the user accessed on the computer.
DRIEMS 11
KEYSTROKE GUARDIAN (KEYLOGGER)
CHAPTER 3
OBJECTIVES
DRIEMS 12
KEYSTROKE GUARDIAN (KEYLOGGER)
OBJECTIVES
The objective of the Keystroke Guardian project is to develop an advanced keylogging system
with enhanced security and privacy features. The keylogger will operate in stealth mode,
ensuring that it remains undetectable during operation. The logged keystrokes will be
captured accurately and securely, with all collected data being encrypted to protect it from
unauthorized access. This project will also explore additional functionalities, such as user-
specific tracking, remote data access, and tamper-resistant logging, to enhance both
functionality and ethical usage. The final product will be evaluated on its performance,
security, and ethical implications in real-world scenarios, focusing on responsible deployment
in environments requiring high levels of data confidentiality and monitoring.
The Keystroke Guardian is a sophisticated keylogging software designed for monitoring and
recording keyboard input. This project focuses on capturing keystrokes efficiently while
maintaining discretion through a stealth mode, ensuring it operates undetectably. One of the
key features of Keystroke Guardian is its robust data encryption mechanism, which securely
encrypts the logged data to prevent unauthorized access or tampering.
1. Keylogging: The core functionality of the software is to record all keystrokes made by
the user. The data is captured in real-time and stored in a secure log file for later
analysis.
2. Stealth Mode: To ensure that the keylogger remains undetectable during its operation,
it operates in stealth mode. This mode hides the application from common detection
mechanisms such as Task Manager, Startup programs, and system processes, making
it nearly invisible to the user.
3. Data Encryption: To protect sensitive data from potential misuse, the logged
keystroke data is encrypted using advanced encryption algorithms. This ensures that
even if the data is intercepted, it remains secure and unreadable without the proper
DRIEMS 13
KEYSTROKE GUARDIAN (KEYLOGGER)
decryption key.
4. Log Management and Export: The software allows for easy retrieval and
management of the logged data. Users can export the encrypted logs for further
analysis or storage, ensuring a seamless and secure way to handle sensitive
information.
The Keystroke Guardian serves as an efficient tool for monitoring purposes while adhering to
stringent security protocols through encryption, making it a comprehensive solution for both
personal and professional usage.
DRIEMS 14
KEYSTROKE GUARDIAN (KEYLOGGER)
CHAPTER 4
SYSTEM ANALYSIS
DRIEMS 15
KEYSTROKE GUARDIAN (KEYLOGGER)
SYSTEM ANALYSIS
The existing model of the current problem statement is the traditional style of transferring
data using keylogger is very costly and not for the small purpose. However, we have
keylogger which is basically used for monitoring payments and, PINs, and passwords as a
result. Without drawing the user's attention. A hardware keylogger is a device that connects
your keyboard to your computer. Keyloggers can be connected directly to the keyboard and
the computer through manually using one of two approaches. PS/2 and the USP keylogger are
two examples.
Keylogger (hardware): -
A hardware keylogger is a tool that fits between the keyboard and the computer.
Keyloggers can be linked to the keyboard physically and computer using one of two
approaches. PS/2 and the USP keylogger are two examples of this method.
The second technique requires the insertion of a keylogger circuit within the
DRIEMS 16
KEYSTROKE GUARDIAN (KEYLOGGER)
keyboard standard rather than a physical connection to the PC. This strategy has the
advantage of not requiring users to physically monitor keyloggers.
Keylogger on the go: - Bluetooth connections have been used by wireless keyloggers to send
information to a log file. over a distance of up to 100 meters. The main goal of this wireless
8keylogger is to intercept broadcast packets from a wireless keyboard that engage a 27 MHz
RF link to transfer translated RF keystroke characters. The disadvantage of this wireless
keylogger is
that it requires a receiver/antenna that is somewhat close to the target region work. Figure 3
depicts a Bluetooth-enabled keylogger.
DRIEMS 17
KEYSTROKE GUARDIAN (KEYLOGGER)
The proposed system introduces an intuitive user interface (UI) that simplifies the
installation process, ensures user consent through explicit terms and conditions, and
provides a dedicated help section for guiding users through the setup and functionalities.
Once the user accepts the terms, the keylogger operates stealthily in the background,
securely capturing keystrokes while adhering to data encryption standards to protect
sensitive information.
The proposed system offers a GUI that enhances the installation experience by making it
straightforward and user-centric. The interface will have the following features:
Installation Wizard: The system guides the user through a step-by-step installation
process with clear instructions.
System Requirements Check: The GUI checks for compatibility with the user's
system, ensuring smooth operation on various operating systems (e.g., Windows,
macOS, Linux).
Customization Options: The user can configure basic settings during installation,
such as the log file location, encryption preferences, and notification settings (if
required).
The GUI design is minimalist, ensuring ease of use without overwhelming the user with
technical jargon.
As the Keystroke Guardian is designed for ethical use, it is crucial to include a detailed
Terms and Conditions section, which ensures user consent and informs them of their legal
obligations. This section will clearly outline:
The purpose of the keylogger (e.g., for monitoring employees or personal use)
A description of the data being collected (e.g., keystrokes, timestamps, applications
used)
A reminder about respecting privacy and legal boundaries, especially for corporate use
Details of the data encryption process for safeguarding sensitive information
DRIEMS 18
KEYSTROKE GUARDIAN (KEYLOGGER)
The keylogger will only begin its operation after the user accepts the terms. If the user
declines, the installation process will be aborted.
A dedicated Help button will be available in the GUI during installation and after
deployment. This section provides detailed documentation, video tutorials, and FAQs for
users who may require assistance. The help section will cover:
The goal is to make the keylogger accessible to both technical and non-technical users,
ensuring that they can use the tool efficiently.
Once the user accepts the terms and completes the installation, the keylogger will begin its
stealth operations. Keylogging occurs in the background without visible traces in task
managers or system processes. Key features include:
To ensure that only authorized individuals can access the logged data, the system will include:
DRIEMS 19
KEYSTROKE GUARDIAN (KEYLOGGER)
User Authentication: Password protection to access the keylogger's logs and settings.
Access Logs: A feature that tracks when and by whom the logs were accessed to ensure
transparency and accountability.
This ensures that sensitive data remains secure and is not accessed by unauthorized users.
Security is paramount in the Keystroke Guardian system, so all captured data is stored in
encrypted form. Key elements include:
Encryption Standards: Use of AES-256 encryption to secure data both at rest and
during transmission (if logs are sent remotely).
Log Rotation and Auto-Deletion: To prevent excessive data accumulation, the
system automatically rotates and deletes old logs based on a set schedule, ensuring
efficient log management and preventing storage overload.
Export Options: Logs can be securely exported to a specified location, and options
for exporting in various formats (CSV, JSON, etc.) will be available for further
analysis.
DRIEMS 20
KEYSTROKE GUARDIAN (KEYLOGGER)
DRIEMS 21
KEYSTROKE GUARDIAN (KEYLOGGER)
SOFTWARE REQUIREMENTS:
Operating System: Window 7 or higher
IDE: Python IDE or VS Code
Libraries: Pynput, Cryptography Fernet, Pywin 32, Smtplib
DRIEMS 22
KEYSTROKE GUARDIAN (KEYLOGGER)
CHAPTER 5
METHODOLOGIES
DRIEMS 23
KEYSTROKE GUARDIAN (KEYLOGGER)
METHODOLOGIES
Environment
Keylogging is utilized for a variety of purposes. It is used to track Internet activity for
company security, parental control, and schools. A keylogger secretly captures
everything you do, including what you type in a word document, emails, online
conversations, and Internet usage. Because a keylogger captures all keystrokes, you
may see the user's name and password as they put it into a form in plain text.
Furthermore, if utilizing secure email
Tkinter
With help of this library GUI is created to provide easy user interface for people who don’t
have much technical information. Tkinter is Python’s standard GUI library used for
developing desktop applications with interactive interfaces. The main window is initialized
using Tk(), and various widgets like Label, Button, and Entry are added to build the interface.
Widgets are arranged using geometry managers such as pack(), grid(), or place(). Event
handling is done using the command parameter or bind() method, allowing the application to
respond to user interactions. The GUI runs within a continuous loop using mainloop(), and
additional features like message boxes, file dialogs, and styling can be added through built-in
modules like tkinter.messagebox and ttk. For smoother user experience, threading or the
after() method is used to handle background tasks without freezing the interface.
Webbrowser
This module is used to open help page for user.
Pynput.keyboard
This library allows you to control and monitor input devices .The pynput library in Python is
commonly used for monitoring and controlling keyboard input, making it ideal for keylogging
and automation tasks. Using pynput.keyboard, a listener is created to detect key presses and
releases in real-time. The Listener class is initialized with on_press and on_release callback
functions to handle user input. Keys are identified using the Key and KeyCode classes,
allowing distinction between special keys (like Shift or Enter) and alphanumeric keys.
DRIEMS 24
KEYSTROKE GUARDIAN (KEYLOGGER)
Fernet
Fernet assures that a communication encrypted with it cannot be modified or read.
Platform
The platform module provides functions to retrieve information about the underlying
platform, including:
1. Operating System (OS)
2. Hardware architecture
3. Processor type
Socket
A request for the page's text can be sent using the socket s. The response will be
read via the same socket.
Clipboard(win32clipboard)
It is utilized to achieve cross-platform copy and pasting in Python. It is a cross
platform library, making it usable in different operating systems to capture clipboard
information
DRIEMS 25
KEYSTROKE GUARDIAN (KEYLOGGER)
CHAPTER 6
RESULT
DRIEMS 26
KEYSTROKE GUARDIAN (KEYLOGGER)
RESULT
Select OK to continue.
DRIEMS 27
KEYSTROKE GUARDIAN (KEYLOGGER)
Once RUN button is pressed the application will continue to run in background.
Fig 7. CHECKBOX
DRIEMS 28
KEYSTROKE GUARDIAN (KEYLOGGER)
DRIEMS 29
KEYSTROKE GUARDIAN (KEYLOGGER)
DRIEMS 30
KEYSTROKE GUARDIAN (KEYLOGGER)
CHAPTER 7
FUTURE SCOPE
DRIEMS 31
KEYSTROKE GUARDIAN (KEYLOGGER)
FUTURE SCOPE.
In corporate settings, keyloggers are likely to evolve as legitimate tools for employee activity
monitoring. Businesses may use these tools to track productivity, ensure compliance with
security policies, and prevent the misuse of sensitive information. With growing concerns
about insider threats, keyloggers could play a vital role in identifying suspicious behaviors
before they escalate into significant security incidents.
The combination of keyloggers with AI and machine learning (ML) algorithms will likely
expand their capabilities. AI-powered keyloggers could learn and adapt to the typing habits of
individuals, making it easier to detect anomalies or suspicious behaviors. This could improve
the precision of detecting threats, especially for financial institutions or government entities
where high-level security is crucial.
Machine learning can also be employed to analyze vast amounts of keystroke data, enabling
pattern recognition that helps identify potential risks. For instance, unusual keystroke patterns
might indicate a compromised system or a human-computer interaction that deviates from
normal behavior, helping to prevent keyloggers from being used maliciously.
The future may witness advances in hardware-based keyloggers, particularly with the
development of smaller, more efficient devices. These could be deployed in highly secure
environments for ethical purposes such as forensic investigations, especially where software-
based solutions are inadequate or susceptible to tampering.
DRIEMS 32
KEYSTROKE GUARDIAN (KEYLOGGER)
As IoT devices and wearables continue to proliferate, keyloggers may find new applications
in these domains. Voice-activated assistants, smartwatches, and other wearable devices that
track user activity are ripe for keylogging technology. Keyloggers could capture more than
just traditional keyboard input, expanding to capture patterns from voice commands, gestures,
and even eye movements in augmented or virtual reality systems.
The data captured from these sources could be used both positively, for user behavior
analysis, and negatively, for malicious purposes. The scope for IoT keyloggers also extends to
smart homes and connected vehicles, where they could be used to track the interactions
between users and smart devices.
DRIEMS 33
KEYSTROKE GUARDIAN (KEYLOGGER)
CHAPTER 8
CONCLUSION
DRIEMS 34
KEYSTROKE GUARDIAN (KEYLOGGER)
CONCLUSION
A keylogger is a type of software or hardware that records keystrokes made on a computer or
mobile device. Keyloggers can be used for legitimate purposes, such as monitoring employee
activity or tracking keyboard usage patterns.
In this way we have created keystroke guardian for monitoring and analyzing the activity of
child for parental control and for corporate to keep track of their employee activity if anything
happens, they can back track.
Keyloggers are sophisticated tools that can access not only the platform, but also the user's
private information like their name, password, pin, card and bank statement. While some
keyloggers are utilized in a legal manner, the creators of many keyloggers do so unlawfully.
Types of Keyloggers
1. Software-based keyloggers
2. Hardware-based keyloggers
3. Remote keyloggers
4. Kernel-level keyloggers
4. Use encryption
DRIEMS 35
KEYSTROKE GUARDIAN (KEYLOGGER)
CHAPTER 9
REFRENCES
DRIEMS 36
KEYSTROKE GUARDIAN (KEYLOGGER)
REFERENCES
1) Keylogger: The Unsung Hacking Weapon: Adi Badiozaman Bin Ruhani, Muhamad
Fadil Zolkipli Vol 6 No 1 (2023): March Submitted: Feb 20, 2023 Published: Mar
2023
2) A. Ahad, M. S. Khan and P. Saxena, "Analysis of Keylogging spyware for
information theft" 2023 1st International Conference on Intelligent Computing and
Research Trends (ICRT), Roorkee, India, 2023
3) https://www.scribd.com/document/616953161/Research-Paper-on-keyloggers
4) D. Damopoulos, G. Kambourakis, S. Gritzalis “From keyloggers to touch loggers:
Take the rough with the smooth” Info-Sec-Lab Laboratory of Information and
Communications Systems Security, Department of Information and Communication
Systems Engineering, University of the Aegean, Samos GR-83200, Greece
5) Robbi Rahim, Heri Nurdiyanto , Ansari Saleh “Keylogger Application to
Monitoring Users Activity with Exact StringMatching Algorithm” IOP Conf.
Series: Journal of Physics: Conf. Series 954 (2018) 012008
6) Mayank Srivastava, Anjali Kumari, Krishan Kant Dwivedi, Sakshit Jain, “Analysis
and Implementation of Novel Keylogger Technique” Publisher: IEEE Published in:
2021 5th International Conference on Information Systems and Computer Networks
(ISCON)
DRIEMS 37