Others: Shimboot (boot Linux) & E-Halcyon (boot unenrolled Chrome OS), note the former is patched on keyrolled devices & the later on v130.
Other ExploitsCAUB/DAUB: disable updates. Note CAUB is patched on v128 & DAUB also blocks kernver updates.
Downgration: not really an exploit but it lets you downgrade thus allowing for more exploits.
Extension Launcher/Skebstore: allows you to download extensions with the webstore blocked.
Firmware2: dekeyrolls your device.
Kernel Version Switcher: allows you to swap your kernver thus allowing for better downgrading.
Murkmod: spoofs Secure Mode with Dev Mode privileges.
Policy Password Tool/Sync Internals Password Extractor: get the password for a Wi-Fi network.
Priism: boot multiple images.
Snap&Run/uRun: unblock bookmarklets.
Finding Information
The 3 things exploits most likely may need are your board name, kernel version, &/or version. Note you may need other things, such as a storage device.
Board Name
In order to find out your board name, go to chrome://version. It will be behind "stabel-channel".
Kernver
In order to find out your Kernver, enter Recovery Mode (Esc+Refresh+Power) & then press Tab. Only the last digit matters.
OS Version
In order to find your OS version, you can do 2 things. The easiest & most precise method is to go to chrome://version. The second & less precise method is to eyeball it.
Miscellaneous
Extension IDs: found in the address bar on either the extension's details or webstore page.
Extension lists: found in either the top-right corner/3 dots or chrome://extensions (not to be confused with the page named the Extension List).
Inspect Element: either right-click or click under the 3 dots.
If you have any issues, questions, & whatnot, you can scroll down, visit the Questions page, or contact me via Discord.
Created by The Wagonization, consisting of JackWagon885
All credit goes to the respective owners. I only compile them in a list.
Fuck you Google