KeyGrabber Forensic Keylogger Ultra White

The KeyGrabber Forensic Keylogger Ultra is an ultra-compact USB hardware keylogger, designed for compatibility with Apple Mac keyboards, keyboards with hubs and card readers, and wireless keyboards. It can handle sophisticated keyboards such as the aluminum A1243 and Dell KB522. It measures only 0.9" (22 mm) in length and 0.3" (8mm) in height, and can be accessed as a USB flash drive for instant data retrieval. Completely transparent for computer operation, cannot be detected by computer software. The KeyGrabber Forensic Keylogger Ultra hardware keylogger features a sophisticated FPGA chip with a 32X oversampling algorithm, making it compatible with all types of USB keyboards and barcode readers.

KeyGrabber Forensic Keylogger Ultra White
  • Only 0.9" (22 mm) long, miniaturized and discreet

  • Optimized for supporting Apple Mac keyboards, keyboards with hubs, and wireless keyboards

  • Works with the Apple aluminum A1243/A1242 series

  • Works with keyboards with USB high-speed hubs, such as Dell KB522

  • Works with most keyboards with built-in card readers

  • Works with most wireless keyboards, such as Logitech Unifying (with exception of Bluetooth)

  • Works with USB barcode scanners, including those with a fast keystroke generation speed

  • Compatible with all USB keyboards, including USB 3.0

  • Sophisticated USB frame capture algorithm with 32X oversampling

  • Doesn't drop keystrokes, compatible with all USB topologies

  • 16 megabytes built-in memory, equivalent of years-worth of typing

  • Switches to flash drive mode with a special key combination

  • Accessible as a USB removable drive for instant data retrieval

  • Memory protected with strong 128-bit encryption

  • Easy to configure with a simple text file

  • No Wi-Fi and wireless footprint, doesn't leave traces in network environment

  • Works with barcode scanners, including fast keystroke generation modes

  • No software, drivers or configuration required, works out of the box

  • High quality durable enclosure

  • Support for multiple keyboard layouts

Compact and discreet

The KeyGrabber Forensic Keylogger Ultra is a general-purpose USB hardware keylogger, with a special architecture capable of handling Apple Mac keyboards (such as the aluminum A1243) and keyboards with special features (hubs, card readers, etc.). Besides Macs, it handles all types of standard USB keyboards, including wireless keyboards (such as Logitech Unifying), USB 3.0 keyboards, keyboards with card readers, and ones with built-in USB high-speed hubs (such as Dell KB522). Being only 0.9" (22mm) in length and 0.3" (8mm) in height, it's designed to be a professional security and surveillance tool, minimizing the risk of exposure. The KeyGrabber Forensic Keylogger Ultra is available with white, black, and aluminum enclosures to choose from.

KeyGrabber Forensic Keylogger Ultra White
KeyGrabber Forensic Keylogger Ultra White

Reliability

Passively monitoring a USB bus for keystrokes is a complex task, and the KeyGrabber Forensic Keylogger Ultra keylogger does this better than any other solution on the market. The KeyGrabber Forensic Keylogger Ultra implements a 32X waveform oversampling algorithm based on a sophisticated FPGA chip. This makes it a top-performer in terms of reliability, with a zero character drop-rate. It works with wireless keyboards (excluding some Bluetooth models), keyboard with integrated hubs, and all types of barcode scanners (including those with a fast keystroke generation speed).

KeyGrabber Forensic Keylogger Ultra White

Ease of use

The KeyGrabber Forensic Keylogger Ultra is as easy to use as all it's predecessors in the KeyGrabber family, being best-sellers since 2005. This hardware keylogger works out-of-the-box by simply plugging it inline between the keyboard and USB socket. Accessing data requires pressing a predefined key-combination known only to the owner. The KeyGrabber Forensic Keylogger Ultra USB has 16 megabytes of built-in memory, what is an equivalent of years of typing.

KeyGrabber Forensic Keylogger Ultra White

Stealthiness

The KeyGrabber Forensic Keylogger Ultra is as stealthy as a hardware keylogger can get. It leaves no traces on the target computer, and doesn't propagate anything in the local Wi-Fi environment. It works as a passive USB-tap device and can't be detected by security and anti-virus software.

KeyGrabber Forensic Keylogger Ultra White

The Pro version

The Pro version is a multi-role security and pen-testing device. It works as a keylogger, but can also be switched to keystroke generation mode. Operating as a HID device it can generate a text-menu, making access to memory and configuration options more convenient. Moreover, it can also run keystroke-injection scripts thanks to a keystroke parser based on a simple scripting language. This makes it a perfect penetration testing tool, combining the functionality of a hardware keylogger and HID injector in a single slick device.

Important Legal Notice

The usage of a keylogger is fully legal as long as a clear notice is displayed, informing the user of the monitored equipment about the presence of a keystroke logger. We encourage the use of this equipment only for the purpose of monitoring your own computer, especially for protecting children against online hazards. It is NOT LEGAL to use a keylogger for the purpose of intercepting third party data, especially passwords, banking data, confidential correspondence, etc. If in doubt, please seek legal advice before using a keystroke logger. A good starting point is the U.S. Department of Justice Letter on Keystroke Monitoring and Login Banners, according to which a clear notice should be displayed, warning that user keystrokes may be logged.

KeyGrabber Forensic Keylogger Ultra White

Keyboard compatibility limitations

The device will work with almost all types of physical USB keyboards (it won't work with internal laptop keyboards). It works fine with wireless keyboards, with exception of Bluetooth keyboards. Support for some gaming keyboards is not fully guaranteed, as they often use proprietary protocols.

Videos

Images