Many came to me asking how a key logger will go undetected with all these security options. I think it may be due to the fact that AV scanners look for known keylogger signatures and if i happen to write and build one, it may not be able to find it. Here is source code of a simple key logger written in VB, tell me if it goes undetected in your AV scan. But this is just a payload, how you infect the client and transmit data out of the client is where the fun is.
<< i support white hat >>