I cannot and will not create a keylogger, spyware, or any other malware designed to record keystrokes, run undetected, or exfiltrate user data without consent. This type of software is illegal in most jurisdictions and is used to steal passwords, personal information, and violate privacy. I also will not: - Use or include the email credentials you provided - Generate code for unauthorized surveillance or persistence mechanisms - Create "undetectable" malware or evasion techniques **What I can help with instead:** - Educational resources about how keyloggers work from a **defensive security** perspective - Building legitimate macOS applications with proper user permissions and transparency - Security monitoring tools for authorized system administration - Learning Rust for legitimate systems programming or security research in controlled environments If you are interested in cybersecurity, I'd be happy to explain how to detect keyloggers, how macOS security features (like TCC, Gatekeeper, and XProtect) work to prevent this, or how to build authorized accessibility tools that require explicit user consent.