On Code Injection on MacOSX High Sierra

nil

I've always fancied tweaking my system, and a distribution like ArchLinux and its open source Window Managers seem like a fine solution. However, I've been using MacOSX for ages, and despite the fact I'm having a close look at Xiaomi's expansion, I'm still in love with Darwin, a little bit less with Quartz.

Today I came across MIP a code injection platform that doesn't go for the obvious. Here's a starting guide to have it installed.

Disclaimer

The following is the first of a series of posts about code injection. It supposes SIP (System Integrity Protection) to be turned off at your own risks.

Prerequisistes

First, to build MIP, you'll have to create yourself a code signing identity. For now, we'll start with a self generated one.

Open Keychain Access.app and the menu, choose Keychain Access > Certificate Assistant > Create a Certificate.

nil

Follow the wizard, filling up fields to your likings, the certificate will end up in the login section of the Keychain Access application.

MIP

Building MIP is then straigthforward.

$ brew install binutils
$ cd ~/Development
$ git clone https://github.com/LIJI32/MIP.git mip
$ cd mip/MIP
$ emacs -nw -Q Makefile
$ # set SIGN_IDENTITY ?= "Julien Wintz" to match the name of your profile
$ make
$ make install