I would not say that a keylogger would be a good choice to investigate the network with, as it would capture usernames, passwords and all kinds of information a hacker could use should they get hold of the keylogger data.
Anyway onto your question, this may be of use if you can get it working...