AVZ Antiviral Toolkit (avz4.zip) has heuristic detection of keyloggers by using neural networks. Also, AVZ Antiviral Toolkit can detect rootkits. It would be great to see how well AVZ Antiviral Toolkit detects various keyloggers. Here is the proposed methodology for those of you who want to test this program against a given keylogger: 1. Download and unzip avz4.zip. No installation is necessary. 2. Run the program. 3. Leave all settings at defaults. 4. Click 'Start' button and wait until it's finished. 5. Look at File->View suspicious objects list. If any of the keylogger's objects appear in this list, then we count this as a successful detection, and otherwise failure. I tested Elite Keylogger v4.1 Build 149 trial vs. AVZ Antiviral Toolkit v4.30. The suspicious objects list showed driver ntmtlf2k.sys with the description 'kernel-mode hook', so AVZ Antiviral Toolkit v4.30 was successful in detection of this particular keylogger . Furthermore, the log showed that this particular driver hooks only functions associated with keystrokes. If some of you wish to test other keyloggers, please post the results here!