Injection
Grave ships with two injectors per platform: a friendly one for everyday use, and a raw one for users who want stealth.
macOS
macOS blocks unsigned binaries from attaching to other processes. With SIP enabled,
both the bundled .app and the standalone Unix executable will fail
silently the moment they try to inject into the Minecraft Java process. Grave is not
notarized by Apple, so the only way to give it the privileges it needs is to turn SIP off.
How to disable SIP:
- Boot into Recovery Mode: shut down, then press and hold the power button until you see “Loading startup options”. Choose Options → Continue.
- From the menu bar, open Utilities → Terminal.
- Run
csrutil disableand confirm with your admin password if prompted. - Reboot normally.
On macOS, Grave ships with two injectors that target any java processes.
Download the .dmg, run and drag the .app to your Applications folder, double-click it and the bundled GUI handles
everything: locating Minecraft, attaching, and loading the client.
A standalone command-line binary you can run from a terminal or wire into your own scripts. Same payload, no GUI, no logo.
How macOS injection works
Injection is fully fileless. The injector pushes both the Mach-O loader dylib and
the client .dylib bytes through POSIX shared memory, then reflectively
maps the loader into Minecraft in-process. The loader pulls the client out of shared
memory and maps it the same way. Nothing touches disk.
Once you're injected, browse modules in the sidebar to see what's available.