cog

Home | All | The Bypassing | Chrome Bypassing Guide | Gamellection | ProxList | Questions


If you have any issues, questions, & whatnot, you can visit the Questions page or contact me via Discord.

Extension Disabling Version stated is the latest before patch.
v106: Ingot
v114: LTMEAT
v128: Hartools
v134: ExtPrint3r

v118/125-6: SKIOVOX

Unenrollment Kernver stated is the latest before patch. Do not powerwash without the Wi-Fi password.
k0-1: SH1MMER
k2: Cryptosmite
k3: BadRecovery
k4: Icarus Lite/BR1CK
k5: Br0ker/sh1ttyOOBE
k0-5: FWWP removal

Others: Appleboot/Shimboot (boot Linux) & E-Halcyon (boot unenrolled Chrome OS).
Note Shimboot is patched on keyrolled devices, Appleboot is patched on v132+, & E-Halcyon is patched on v130+

Wi-Fi Password Do not powerwash without the Wi-Fi password.
Policy Password Tool
Sync Internals Password Extractor

Other Exploits CAUB/CKAUB: disable updates. Note CAUB is patched on v128 & CKAUB also blocks kernver updates.
Downgration: not really an exploit but it lets you downgrade thus allowing for more exploits.
Extension Launcher/Skebstore: allows you to download extensions with the webstore blocked.
Firmware2: dekeyrolls your device.
Kernel Version Switcher: allows you to swap your kernver thus allowing for better downgrading.
Murkmod: spoofs Secure Mode with Dev Mode privileges.
Policy Password Tool/Sync Internals Password Extractor: get the password for a Wi-Fi network.
Priism: boot multiple images.
Snap&Run/uRun: unblock bookmarklets.

Finding Information The 3 things exploits most likely may need are your board name, kernel version, &/or version. Note you may need other things, such as an external storage device.
Board Name In order to find out your board name, go to chrome://version. It will be behind "stabel-channel".
Kernver In order to find out your Kernver, enter Recovery Mode (Esc+Refresh+Power) & then press Tab. Only the last digit matters.
OS Version In order to find your OS version, you can do 2 things. The easiest & most precise method is to go to chrome://version. The second & less precise method is to eyeball it.
Miscellaneous Extension IDs: found in the address bar on either the extension's details or webstore page.
Extension lists: found in either the top-right corner/3 dots or chrome://extensions (not to be confused with the page named the Extension List).
Inspect Element: either right-click or click under the 3 dots.

Post Unenrollment Enable "MAC Address Randomization" in chrome://flags to cloak yourself.
Use Kernel Version Switcher & DAUB.
Disable FWWP.

Created by The Wagonization, consisting of JackWagon885
All credit goes to the respective owners. I only compile them in a list.
Fuck you Google