The Abuse Log.

Trauma informed abuse journaling.

Download our eBook Personality & Abuse…

COMING SOON

The Abuse Log.

The Abuse Log (AL) is a carefully designed interactive journaling app created to aid in uncovering and addressing instances of narcissistic abuse through a trauma-informed system for documenting incidents.
AL's purpose is to log abuse in a manner that reveals manipulation tactics, empowering victims to break the trauma bond and embark on the path to healing.

Types of abuse.

Distinguishing and understanding the various types of abuse facilitates a nuanced comprehension of trauma. This knowledge equips victims with the tools to recognize abusive patterns, validate their experiences, and seek appropriate support.

The Abuse Log seamlessly integrates comprehensive documentation with powerful references, terminology, and definitions. It provides a structured platform to log every aspect of your abuse, memories, thoughts, musings and healing, guiding you to empowerment every step of the way.

  • Physical abuse involves intentional force causing bodily harm, injury, or impairment, seen in hitting, punching, or burning. It leaves visible marks but can also harm internally. Common in domestic and institutional settings.

  • Psychological abuse targets mental and emotional well-being through manipulation, gaslighting, or verbal threats. It undermines self-worth and can lead to anxiety and depression. Often occurs alongside other abuses.

  • Non-consensual sexual activity, including assault, harassment, or exploitation, inflicting physical and psychological trauma. Perpetrators exert power and control, exploiting vulnerabilities. Prevalent across ages and genders.

  • Exploiting or controlling finances without consent, leading to deprivation or harm. It includes theft, fraud, or coercion and often occurs in intimate or caregiver relationships.

  • Mistreatment or neglect within healthcare settings, seen in unnecessary procedures or medication, targeting vulnerable populations. Perpetrators misuse authority, causing physical and psychological harm.

  • Religious abuse involves the exploitation or manipulation of religious beliefs to control or harm individuals. It can include forced adherence to certain beliefs, rituals, or practices, as well as using religion to justify physical, psychological, or sexual abuse. Perpetrators may use religious authority to exert power and control over victims, causing spiritual and emotional harm. Religious abuse can also involve discrimination, ostracism, or exclusion based on religious beliefs.

  • Child abuse shatters innocence, leaving scars unseen but deeply felt. Parents, as advocates, carry the burden of witnessing their child’s pain. The Abuse Log stands as their ally, offering a channel to document and confront the horrors inflicted upon their precious ones. It provides a voice for the voiceless, empowering parents to fight tirelessly for justice and healing, ensuring their children’s safety and well-being.

  • Elder abuse is a heartbreaking reality, often occurring in plain sight with witnesses feeling helpless to intervene. The Abuse Log understands the profound pain and vulnerability of elderly victims. It offers a compassionate solution, empowering both victims and witnesses to document incidents and seek support, fostering a safer and more caring environment for our elders.

Personality profiles.

Access to comprehensive resources on abuse and abusive personalities is invaluable for evaluating the quality of relationships. It equips individuals with knowledge to discern manipulative behaviors, set boundaries, and identify healthy dynamics. Armed with this understanding, one can make informed decisions about whom to trust and allow into their inner circle.

  • The Adverse Childhood Experiences (ACE) Test measures childhood trauma’s impact on health and behavior. It assesses experiences like abuse, neglect, and household dysfunction. High ACE scores correlate with increased health risks and social problems in adulthood, highlighting the importance of early intervention and support.

  • Post-Traumatic Stress Disorder (PTSD) develops after experiencing or witnessing a traumatic event. Symptoms include flashbacks, nightmares, hypervigilance, and emotional numbness. PTSD affects daily functioning and relationships, requiring therapy and support for recovery.

    Complex Post-Traumatic Stress Disorder (CPTSD) results from prolonged trauma, such as abuse or captivity. Symptoms include emotional dysregulation, dissociation, and distorted self-image. CPTSD often affects interpersonal relationships and self-esteem, requiring specialized treatment focusing on trauma recovery and coping skills.

  • Attachment style reflects how individuals relate to others based on early caregiver interactions. Secure attachment fosters trust and intimacy, while insecure styles like anxious or avoidant attachment lead to relationship difficulties. Understanding attachment patterns helps improve communication and emotional connection in relationships.

  • Codependency involves dysfunctional, one-sided relationships where individuals prioritize others’ needs over their own. It often stems from childhood experiences or trauma. Codependents may struggle with boundaries, self-esteem, and enabling behaviors, perpetuating unhealthy dynamics. Therapy and self-awareness are key to breaking codependent patterns.

  • Personality traits are enduring patterns of thoughts, feelings, and behaviors that shape individuals’ behavior and relationships. The Big Five traits include openness, conscientiousness, extraversion, agreeableness, and neuroticism, influencing how people interact with the world. Understanding one’s personality traits can enhance self-awareness and personal growth.

  • Red flags are warning signs indicating potential problems or danger in relationships or situations. In interpersonal relationships, they may include manipulation, dishonesty, or controlling behavior. Recognizing red flags is crucial for setting boundaries and protecting one’s well-being.

  • Cognitive distortions are irrational thoughts shaping perception and behavior, like all-or-nothing thinking or catastrophizing. They fuel anxiety, depression, and conflicts. Recognizing and challenging these distortions enhances mental well-being and decision-making. Cognitive-behavioral therapy (CBT) addresses distortions by fostering adaptive thinking and coping strategies. Awareness empowers individuals to approach situations objectively, reducing negative impacts on mental health and functioning.

  • Disordered personality traits refer to maladaptive patterns of behavior and cognition seen in personality disorders like narcissistic, borderline, or antisocial personality disorder. These traits cause distress and impairment in functioning, impacting relationships and daily life. Some personality profile are prone to abusive behavior and . The Abuse Lop illuminates these traits, so you can easily detect them.

  • Dark core traits encompass malevolent personality characteristics such as narcissism, Machiavellianism, and psychopathy. These traits involve manipulation, callousness, and lack of empathy, often leading to harmful behavior toward others. Understanding and identifying dark core traits are essential for recognizing and protecting against toxic individuals and situations.

Abuse tactics.

Understanding the tactics used by your abuser is crucial for several reasons. Firstly, it helps you recognize and validate your experiences, reducing feelings of self-blame and isolation.

The Abuse Log provides a comprehensive platform to document any form of abuse, no matter how subtle or hidden. It empowers users to validate their experiences, seek support.

  • Triangulation is a manipulative tactic used to create tension and insecurity within relationships by involving a third party. The purpose is to sow discord, maintain control, and assert dominance over others. This form of abuse is harmful as it erodes trust, fosters jealousy, and undermines self-esteem. Victims often experience confusion and isolation, as they struggle to navigate the complexities of the manipulated dynamics. Triangulation can lead to long-lasting emotional damage, as individuals may find it difficult to establish healthy relationships and develop a sense of security when their interactions are constantly overshadowed by manipulation and distrust.

  • A smear campaign is a deliberate and coordinated effort to spread false or damaging information about someone with the intention of tarnishing their reputation. The purpose is often to undermine the victim’s credibility, isolate them socially, or gain a strategic advantage. This form of abuse is profoundly harmful as it can lead to defamation, ostracization, and emotional distress for the victim. It erodes trust, damages relationships, and can have severe consequences on the victim’s personal and professional life. Moreover, the psychological impact of being targeted by a smear campaign can result in feelings of powerlessness, betrayal, and profound emotional pain.

  • Intermittent reinforcement by a narcissist involves sporadic patterns of reward and punishment to manipulate and control others. The purpose is to keep victims emotionally dependent, unsure of their worth, and constantly seeking validation from the narcissist. This abuse causes profound harm as it disrupts the brain’s natural chemical balance, leading to physiological damage. Random fluctuations in serotonin, oxytocin, and cortisol levels induced by the unpredictable behavior of the narcissist contribute to heightened stress, anxiety, and emotional instability in victims. Over time, this physiological turmoil exacerbates mental health issues and can lead to long-term psychological damage, including depression and PTSD.

  • Baiting or goading is a manipulative tactic where someone provokes another person into reacting impulsively or aggressively. The purpose is to escalate conflicts, undermine the victim’s emotional stability, and justify further abuse. This form of psychological abuse is harmful as it creates a cycle of tension and conflict, leading to heightened stress and emotional distress for the victim. It can also damage relationships and erode trust, as the victim may struggle to manage their reactions and perceive the baiting behavior as intentional hostility. Ultimately, baiting undermines the victim’s sense of control and well-being, perpetuating a toxic dynamic of manipulation and abuse.

  • Brandishing rage, whether real or feigned, involves displaying intense anger or aggression to intimidate or control others. The purpose is to instill fear, assert dominance, and manipulate behavior. This form of psychological abuse is deeply harmful as it creates a hostile environment characterized by unpredictability and fear. Victims may experience emotional trauma, anxiety, and a constant sense of threat. Additionally, witnessing or experiencing frequent displays of rage can lead to long-term psychological effects, such as heightened stress levels, low self-esteem, and difficulty forming healthy relationships. Brandishing rage perpetuates a cycle of intimidation and coercion, undermining victims’ mental and emotional well-being.

  • The silent treatment is a form of psychological abuse where someone intentionally ignores or refuses to communicate with another person as a means of punishment or control. The purpose is to manipulate behavior, induce guilt, and assert power over the victim. This tactic is deeply harmful as it inflicts emotional pain, erodes trust, and undermines the victim’s sense of self-worth. Victims often experience intense feelings of rejection, isolation, and anxiety, as they struggle to understand and cope with the sudden withdrawal of communication. The silent treatment can damage relationships, perpetuate cycles of conflict, and have long-lasting effects on mental health.

  • Isolation is a form of psychological abuse where an individual restricts or controls another person’s access to social connections, support systems, or external resources. The purpose is to increase dependency, prevent outside influence, and maintain control over the victim. This tactic is profoundly harmful as it leads to feelings of loneliness, helplessness, and diminished self-worth. Victims may experience heightened vulnerability to further manipulation and abuse, as well as difficulty seeking help or support. Isolation damages relationships, undermines autonomy, and perpetuates feelings of powerlessness, making it challenging for victims to break free from the cycle of abuse and regain independence.

  • Parental alienation is a form of psychological abuse where one parent manipulates a child into rejecting the other parent. The purpose is often to undermine the parent-child relationship and gain control over the child’s loyalty and allegiance. This abuse is profoundly harmful as it damages the child’s emotional well-being, instills confusion, and perpetuates feelings of rejection and betrayal. Children subjected to parental alienation may experience long-term psychological trauma, struggle with identity issues, and face difficulties forming healthy relationships in the future. Furthermore, it erodes trust within the family unit and can lead to lifelong emotional scars for both the child and the targeted parent.

Create profiles.

In the intricate tapestry of life, relationships weave a vital thread. Abusers, particularly narcissists, disrupt this fabric by employing manipulative tactics like triangulation, smear campaigns, public humiliations, and alienation.

Maintaining detailed profiles on abusers, potential abusers, and victims offers crucial insights. It enables recognition of red flags, validation of experiences, and informed decision-making about relationships.

  • Creating a psychological personality profile of narcissistic abusers is vital for understanding their manipulative tactics and patterns of behavior. This profile serves as a framework for logging individual incidents of abuse, providing victims with concrete evidence to validate their experiences, seek support, and break free from toxic relationships.

  • Creating psychological profiles of flying monkeys, those who partake in proxy abuse for narcissists, is vital for discerning susceptibility to smear campaigns and identifying willing participants in abuse. These profiles aid in logging incidents, offering evidence to validate experiences, seek support, and counteract manipulation tactics effectively, promoting healing and accountability.

  • Creating psychological profiles of flying monkeys, those who partake in proxy abuse for narcissists, is vital for discerning susceptibility to smear campaigns and identifying willing participants in abuse. These profiles aid in logging incidents, offering evidence to validate experiences, seek support, and counteract manipulation tactics effectively, promoting healing and accountability.

  • Maintaining psychological profiles for children is essential for accurately documeanting abusive incidents where they are the victims. These profiles provide a structured framework for recording and analyzing each incident, ensuring that the child’s experiences are properly documented and validated, facilitating appropriate intervention, support, and protection.

  • Each child is unique. Narcissistic parents abuse their children uniquely, casting them in roles that triangulate them with each other and them from you. They are victims even if they are victimized differently. The Abuse Log was built to give every victim a voice, even those who are too young to articulate their trauma.

  • Maintaining psychological profiles and detailed logs for extended family members is crucial for understanding their roles and behaviors in perpetrating abuse. These tools aid in documenting and validating abusive incidents, facilitating appropriate intervention, support, and protection for victims, and holding perpetrators accountable for their actions within familial dynamics.

  • Integrating toxic family roles into psychological profiles enriches the contextualization of abusive incidents perpetrated by narcissists. This approach acknowledges how family members, like the golden child sibling, frequently engage in or facilitate abuse. It fosters a comprehensive understanding of familial dynamics, aiding in accurate documentation and targeted intervention strategies.

Create documentation.

Logging details of abuse, thoughts, emotions, creative impulses, and self-care activities can be immensely therapeutic. It provides a safe outlet for processing trauma, validating experiences, and reclaiming personal agency. By documenting the journey, individuals gain insight into their healing process, track progress, and cultivate self-awareness. Expressing oneself through writing or other creative mediums fosters emotional release and empowerment.

  • When logging an incident of psychological abuse, it’s crucial to include specifics such as date, time, location, description of the abusive behavior, emotional and physical effects, and any witnesses present. Documenting these details provides concrete evidence, validates experiences, and aids in seeking support and intervention.

  • For victims of narcissistic abuse who journal regularly, expressing general thoughts on abuse, not just specific incidents, is crucial. It broadens exploration of emotions, patterns, and triggers, fostering deeper understanding. This aids in recognizing abuse, fostering healthy relationships, and promoting overall healing and recovery from the abusive dynamics.

  • Victims of narcissistic abuse find solace in “stream of thought” or “flow” journals during intense rumination. These spontaneous writings capture raw emotions, offering catharsis and clarity amidst distress. They track patterns, identify triggers, and aid coping, empowering victims to navigate healing effectively amidst overwhelming circumstances.

  • Emotional devastation from narcissistic abuse can spur sporadic bursts of creativity. Having a cohesive journaling tool to capture these moments offers numerous benefits. It provides an outlet for expression, fosters healing, and helps process complex emotions. Additionally, it serves as a record of personal growth and empowers reclaiming one’s narrative.

  • Item description

Upload media.

  • Capturing media (video, audio, pictures, documents) of abuse serves as vital evidence for legal proceedings, custody battles, and trauma therapy. The Abuse Log meticulously catalogs these incidents, providing tangible validation and grounding victims in reality, countering the insidious effects of gaslighting. It empowers individuals to seek justice and healing.

  • Item descriPersonal video and audio logs within The Abuse Log serve as cathartic tools, providing a means to track progress and reflect on the journey of healing. With media uploads, users can deliver personal messages, whether to their future selves, abusers, or the world at large. This feature empowers individuals to speak their truth, assert their agency, and find solace within the app’s supportive environment.ption

  • The document upload section of The Abuse Log enables users to upload pertinent documents, such as custody agreements and financial records, aligning them chronologically to create a comprehensive timeline. This feature ensures that users have a clear and organized record of events, facilitating legal proceedings and documentation of their experiences.

  • The Abuse Log’s media upload section accommodates inspirational content collected by users—memes, videos about abuse, recovery, or anything positive aiding healing. It offers a repository of uplifting resources, fostering a supportive environment for users on their journey to recovery.

  • Item description

Export Logs.

The Abuse Log App revolutionizes the way victims of narcissistic abuse document their experiences, offering intuitive export features tailored for court proceedings, custody battles, therapy sessions, and personal healing. Empowered yourself ti reclaim control with tangible evidence.

  • Capturing media (video, audio, pictures, documents) of abuse serves as vital evidence for legal proceedings, custody battles, and trauma therapy. The Abuse Log meticulously catalogs these incidents, providing tangible validation and grounding victims in reality, countering the insidious effects of gaslighting. It empowers individuals to seek justice and healing.

  • The Abuse Log’s media upload section accommodates inspirational content collected by users—memes, videos about abuse, recovery, or anything positive aiding healing. It offers a repository of uplifting resources, fostering a supportive environment for users on their journey to recovery.

  • Item descriPersonal video and audio logs within The Abuse Log serve as cathartic tools, providing a means to track progress and reflect on the journey of healing. With media uploads, users can deliver personal messages, whether to their future selves, abusers, or the world at large. This feature empowers individuals to speak their truth, assert their agency, and find solace within the app’s supportive environment.ption

  • The document upload section of The Abuse Log enables users to upload pertinent documents, such as custody agreements and financial records, aligning them chronologically to create a comprehensive timeline. This feature ensures that users have a clear and organized record of events, facilitating legal proceedings and documentation of their experiences.

  • Item description

Comprehensive abuse journal.

The Abuse Log app goes beyond mere journaling, offering powerful tools to understand the subtle nuances of abusive personalities for greater clarity and healing.

  • Self-Care Log: Prioritize self-care activities by tracking them within the app, ensuring emotional well-being and resilience are maintained throughout the healing journey. This feature serves as a reminder to prioritize one’s own needs amidst the challenges of navigating abuse recovery.

  • The Abuse Log App’s Profiles section revolutionizes understanding abuse dynamics, empowering users to navigate experiences with clarity and agency. Profiles offer insights, though not professional diagnoses, into relationships, aiding personal insight and empowerment.

  • Detailed Log feature stands as a game-changer for survivors, offering a structured platform for forensic documentation of abuse tactics. By meticulously logging details and providing irrefutable evidence of abuse, survivors can reclaim their truth, hold their abusers accountable, and secure justice and empowerment.

  • The Abuse Log’s Quick Log feature offers streamlined abuse documentation, maintaining key details without extensive checklists. Users swiftly record crucial information, enhancing usability and empowering agency.

  • Flow Log: Express emotions creatively through various mediums like writing, audio recordings, or other expressive outlets. This feature provides a safe space for users to channel their feelings, process their experiences, and explore healing through creative expression.

  • In the journey of healing from abuse, self-care plays a crucial role in nurturing mental, emotional, and physical well-being. Recognizing the significance of self-care in the recovery process, The Abuse Log App introduces its innovative Self-Care Log feature. Let’s delve into the functionality and benefits of this invaluable tool.

  • Contact Log: Maintain control and boundaries by managing and adjusting contact status with abusers. Whether opting for full contact, low contact, or no contact, this feature empowers users to make informed decisions about their interactions, enhancing safety and promoting healthy boundaries.

  • Add References: Establish connections between related logs to unveil patterns and provide comprehensive documentation of the abuse experience. By referencing previous incidents, users can gain insights into the dynamics of their relationships and strengthen their case for validation and support.

  • Add Ancillary Profiles: Document individuals associated with the abuse, such as enablers or bystanders, to gain a more comprehensive understanding of the abuse ecosystem. This feature allows users to identify and address all facets of their abusive experiences, promoting holistic healing and accountabilit

  • The documentation of child abuse is a proactive measure to safeguard their emotional and physical health, providing a foundation for intervention and support.

    In cases of narcissistic abuse, documenting the mistreatment of your children strengthens your case for custody arrangements and legal intervention.

    Documenting child abuse in narcissistic dynamics helps break the cycle of silence and denial, ensuring that their voices are heard and validated

  • Tag Profiles and Resources: Easily reference individuals and support networks within logs to provide context and facilitate communication. This feature enables users to access relevant information quickly, enhancing collaboration, and coordination within their support systems.

  • Documenting media files is essential in The Abuse Log to provide visual evidence and context to abusive incidents. It adds credibility and clarity to the documented experiences, aiding in legal proceedings or seeking support.

  • Export empowerment with the Abuse Log App’s Export feature allows users to preserve and share logs for legal, medical, or personal purposes. Flexible formatting enhances credibility and peace of mind. It underscores the app’s commitment to empowering survivors.

  • Extensive Resources: Access a wealth of information, guidance, and support within the app to aid healing, understanding, and empowerment. This feature equips users with the knowledge and resources needed to navigate the complexities of abuse recovery and build resilience.

  • Checklists Provide Easy Access to Common Terminology: Streamline documentation with pre-defined checklists of abuse terminology, making it easier for users to articulate their experiences and identify abusive behaviors. This feature promotes clarity, consistency, and accuracy in documenting abuse dynamics.

  • Cloud Storage for Increased Security: Safeguard logs and data with secure cloud storage, ensuring privacy and confidentiality are maintained. This feature provides users with peace of mind, knowing that their sensitive information is protected and accessible whenever needed.

What makes The Abuse Log unique?

  • Placeholder

    Intuitively designed for victims of abuse.

    Designed by a survivor of narcissistic abuse, The Abuse Log App will help you make sense of the abuse untangle the web of trauma.

    The Abuse Log is a Swiss Army knife of recovery,. You can tackle the challenges of narcissistic abuse head-on, armed with the tools and resources needed for healing.

    Documenting narcissistic abuse with The Abuse Log app isn't just about recording incidents—it's about understanding the intricacies of abusive personalities to break free from their grip

  • Placeholder

    Track abusive patterns by connecting similar logs.

    The Add References feature is a game-changer in documenting narcissistic abuse, connecting similar logs together to create a web of truth that's impervious to gaslighting. Users can build a fortress of truth to shield themselves from mind games.

    Connecting similar logs creates a unified story of validation and empowerment, weaving together the threads of their experiences to form a tapestry of truth.

  • Placeholder

    Keep your loved ones safe by tagging Secondary Victims in your logs.

    Advocate for you children with The Abuse Log App. The Secondary Victim feature connects your child’s profile to logs that detail their abuse. By logging instances of abuse towards your children, you create a record that can be used to advocate for their safety and legal protection.

    Documentation serves as a shield against gaslighting and manipulation, affirming the reality of your children's experiences and the urgency of intervention

  • Tools to educate yourself about abusive personalities and their tactics to harm others.

    Documenting psychological abuse with The Abuse Log app isn't just about recording incidents—it's about understanding the nuances of abusive personalities to reclaim your sense of self offering insights and analysis tools to empower you on your journey to healing from abuse.

    Detailed documentation helps unravel the complexities of narcissistic abuse, allowing you to see the patterns and tactics clearly

  • Extensive self-assessment checklist for shadow work and self-knowledge.

    Our app includes a self-assessment feature that helps users understand hidden trauma, empowering them to recognize and address the effects of narcissistic abuse.

    With our app, users can embark on a journey of self-discovery, using the self-assessment feature to uncover hidden trauma and reclaim their sense of self.

  • Create Profiles for everyone involved and tag them in your logs.

    Users can create detailed profiles of people in their lives, helping them sift through toxic relationships and prioritize their well-being.

    Profiles enable users to identify patterns and behaviors in specific individuals and make informed decisions about their relationships.

    Users can gain insight into the people in their lives, enabling them to cultivate a supportive network of individuals who uplift and empower them

  • Timestamps and metadata ensure that logs that are accurate, credible and admissible in court

    With precise metadata and timestamps, the Abuse Log app becomes an invaluable asset for court proceedings. Offering concrete evidence of when incidents occurred, this feature ensures accuracy, credibility, and organization, simplifying the legal process and supporting survivors in seeking justice..

    Documentation is essential for obtaining restraining orders, custody arrangements, and other legal protections against narcissistic abusers."

    Through documentation, you build a solid foundation for legal action, increasing the likelihood of obtaining justice and holding the abuser accountable

  • Logs provide concrete examples for to explore and process during therapy or coaching sessions

    Therapists and coaches can use your documentation as a roadmap for guiding your journey from victimhood to survivorship, fostering self-awareness and empowerment.

    Documenting narcissistic abuse fosters collaboration between you and your therapist or coach, empowering you to actively participate in your healing journey.

    The Abuse Log uncovers hidden patterns and behaviors that reveal the true nature of the manipulation at play, providing priceless insights to mental health professionals.

  • Media uploads are linked to logs, providing comprehensive documentation

    In the digital age, protecting your documentation of narcissistic abuse is paramount.

    With Abuse Log, you can capture every aspect of narcissistic abuse – from verbal attacks to subtle manipulation – with audio, picture, video, and document uploads.

    With our app, you have the power to document narcissistic abuse in real-time, capturing evidence of manipulation and mistreatment.

    Cloud storage provides a secure vault for documenting narcissistic abuse, safeguarding your logs from tampering or deletion by the abuser.

  • Self-Care Log encourages healthy habits during the healing process.

    The Self-care log empowers users to take control of their healing journey, providing tools and resources to support their mental and emotional well-being in the face of narcissistic abuse.

    Documenting narcissistic abuse is an act of courage, and our app's self-care tracker ensures that users prioritize their own well-being as they confront their experiences head-on.

    Users can track their progress on their journey of healing from narcissistic abuse, celebrating small victories and prioritizing self-care along the way.

  • Our emoji-based calendar offers users a unique and intuitive way to view logs.

    Our app's emoji-based calendar takes the guesswork out of documenting narcissistic abuse, providing users with instant insights into their experiences with just a glance.

    With our app's emoji-based calendar, users can easily identify trends and patterns in their experiences of narcissistic abuse, empowering them to take proactive steps towards healing

  • Enhance your understanding of abusive personalties.

    With our app's resources section, users gain access to expert knowledge about personalities and abuse patterns, helping them navigate the complexities of narcissistic abuse with insight and resilience.

    The Resources section offers users a comprehensive toolkit for combating narcissistic abuse, providing invaluable knowledge about personalities and tactics.

  • Log bursts of creativity with the Flow Log.

    Our app's Flow Log feature offers users a safe space to express themselves creatively amidst the turmoil of narcissistic abuse, providing an outlet for healing and self-expression.

    Users can embrace their creativity as a form of resistance against narcissistic abuse, channeling their pain into art and reclaiming their power in the process. Users can capture moments of inspiration and beauty amidst the pain.

  • Combat triangulation and smear campaigns with Ancillary Profiles

    Documenting flying monkeys with the Ancillary Profile feature provides a comprehensive view of the narcissistic dynamic, showcasing the extent of the manipulation and the network of support the narcissist relies on.

    Identify patterns of collusion to strengthen your case for setting boundaries and seeking support. Flying monkeys often play a pivotal role in the narcissist's smear campaigns, making it crucial to document their involvement to protect your reputation and well-being.

  • Detailed checklists illuminate the abuse in a way you never thought possible

    By using our app to document narcissistic abuse, you can peel back the layers of denial and minimization, confronting the harsh realities of your experiences.

    Documenting narcissistic abuse with Abuse Log is like conducting your own investigation, uncovering the hidden truths and deceptions that lurk beneath the surface

    The user can piece together the puzzle of narcissistic abuse, connecting the dots

The Lost Child Plan

$5/mo

Limited Functionality

Log abuse today.

Best Value

The Golden Child Plan

$7/mo

Fully Unlocked / Limited Storage

The Scapegoat Plan

$10/mo

Fully Unlocked / Unlimited Storage

COMING SOON

Send us your feedback

We welcome feedback concerning the functionality of The Abuse Log App.