This is a repository filled with school proxy/game websites and chromeOS hacks to bypass school web filtering.
Need help? Ask for help here!
Website (Auto Updated) https://agguiopz.github.io/Priv/
- PRIV
- Classlink Login (History Flooder)
- Corkey (Corrupt Extensions)
- ExtHang3r (Freeze Extensions)
- RigTools (Disable Extensions
- Dextensify (Freeze Extensions)
- LTMEAT (Freeze Extensions)
- Corkey (Corrupt Extensions)
- BlobWifi (Disable Updates)
- CauDNS (Edit Server Names)
- Chrome100 (Revert Versions)
- Policy Password Tool (WIFI Password Extractor)
- Bypass Content Keeper (Bypass Blocked Pages)
- Extension Information (View Allowed and Unblocked Extensions)
𝗖𝗹𝗮𝘀𝘀𝗹𝗶𝗻𝗸 𝗟𝗼𝗴𝗶𝗻 is an html file that allows you to 𝗳𝗹𝗼𝗼𝗱 𝘆𝗼𝘂𝗿 𝗵𝗶𝘀𝘁𝗼𝗿𝘆 𝘄𝗶𝘁𝗵 𝗖𝗹𝗮𝘀𝘀𝗹𝗶𝗻𝗸 𝗟𝗼𝗴𝗶𝗻 to hide uneducational websites from your browser history. This will cause your computer to lag during flooding since the HTML website is actively creating new url inputs.
Created by me
-
Download the HTML file and open it
-
Put in the username and password which are both
history
-
Put an integer greater than one
-
You are all set, you can keep this running.
I do not recommend using this because it won't show the name
- Copy the text from here
- Put it in your url bar in a new tab
- Follow instructions from 2-4 from the HTML version
Just open up the html file source code then find what you want to rename and then download the html file
This exploit allows you to corrupt extensions interrupting the sync process.
Discovered by AkaButNice, Bypassi#7037
Named by Ashton Davies & Brandon421-ops (Their github page was deleted)
You will have to factory reset your chromebook so make sure you know your wifi password at home or at school (I advise doing this at home) and make sure you sync all of the files you want to save into your google drive
You must have acess to login without wifi (sign in as an existing user)
If your organization does not allow you to sign in without a network, you should instead prevent internet access on your network.
This requires precise timing and good reflexes
-
Powerwash / Factory Reset
Press CTRL+D on the recovery/insert USB screen
Press Enter
-
Sign in
-
Immediatly disconnect from your network
-
Navigate to the url chrome://extensions
-
Connect to your network
-
Wait for the extension that you want to corrupt automatically install
-
Immediately disconnect from your network and restart
-
Sign in again as an existing user with no wifi to ensure the extension was corrupted just like what the image showed
The other extensions shouldn't install
Slightly Bad Scenario: If you don't see any extenison or any of the extensions installed then you are gonna have to try again (do steps 7 - 9 again) and maybe do step 8 a little later but not too late otherwise it will fully install
Worse Case Scenario: If the extension is installed but its not corrupted you are going to have to do it all over again this means factory resseting once again
Best Case Scenario: You did it!! Repair any extensions you want to fix and restart your chromebook and log in with your wifi on again to fix your files not being able to be opened for download
𝗘𝘅𝘁𝗛𝗮𝗻𝗴𝟯𝗿 is an exploit that allows ChromeOS users to 𝗸𝗶𝗹𝗹 𝗺𝗮𝗻𝗮𝗴𝗲𝗱 𝗲𝘅𝘁𝗲𝗻𝘀𝗶𝗼𝗻𝘀 after the LTMEAT patch. It remains unpatched in all new ChromeOS versions as of November 2024.
Created by Blobby
Download the HTML file or copy the data: link and paste it into a new tab
When you start hanging it will take longer than one minute and it will lag a ton since it is refreshing iframes, so I recommend closing all your other tabs before hanging. If you are using securly please use securly (old)
to disable Securly for Chromebooks.
Executing code in Developer Tools and extensions. Capable of utilizing many privileges.
Made by FWSmasher [MunyDev, Fallenmoon8080, Entrpix], appleflyer
This is patched in chromeOS 128
Must have access to devtools://devtools/
- Open this link and just leave it there
devtools://devtools/bundled/devtools_app.html
- Open this link and press the Network tab on the top
devtools://devtools/bundled/devtools_app.html?experiments=true&ws=rig.kxtz.dev/
- Double-Click the box under name
-
Press any of the keys 1-9 or click extension-ID and find your extension-ID.
-
(extension id method) If you clicked extension-id paste in the extension ID and it should load a filesystem: page. You may have other extensions under it, you can disable those too.
-
(hardcoded keys method) If you clicked any of the keys and got sent to the page you can disable any of the following extensions. You can also scroll down to see other scripts and even put in your own scripts.
Website
Repository
Discord
Source Code
Titanium Network
SincereHam222
Dextensify is an exploit which lets you 𝗱𝗶𝘀𝗮𝗯𝗹𝗲 𝗺𝗼𝘀𝘁 𝗮𝗱𝗺𝗶𝗻-𝗶𝗻𝘀𝘁𝗮𝗹𝗹𝗲𝗱 𝗖𝗵𝗿𝗼𝗺𝗲 𝗲𝘅𝘁𝗲𝗻𝘀𝗶𝗼𝗻𝘀 from any webpage. It can be used from regular websites, HTML files, and data URLs.
Made by ading2210
Improved Version by STPv22
- Open up the HTML file or Copy the data: link and paste it into a new tab
- Open up your settings page for your extension (if you are using securly use Securly for Chromebooks
- If you are on Securly use Freeze Securly (old) to bypass blocked pages. The other extensions are fine since it's usually just one extension
- Press ok then instantly switch back to your extension page and start spamming
Allow access to file URLs
- While you are in a middle of a laggy state wait a few seconds then instantly press your url bar and go to any website or smth and close the dextensify page
- Note that the extension may turn back on at random intervals which is why you must sometimes have to press
Allow access to file URLs
again every few minutes
Unblocks websites by making urls too long and 𝗼𝘃𝗲𝗿𝗹𝗼𝗮𝗱𝗶𝗻𝗴 𝘀𝗲𝗿𝘃𝗲𝗿𝘀.
Made by schoolexploitkid
Open up the HTML file or copy the data: link and paste it into a new tab and follow instructions on-screen from there
This does not work for most extensions that can support more letters but you are free to use the other given options in the website.
How it Works/Original Repository
Alternative method of LTMEAT based on Alternate Method #1 that hangs and refreshes extensions naturally without debug URLs.
Visit https://ext-remover.net/detail/LTMEAT%20Flood/ and follow on-screen instructions from there.
Corrupts extensions by interrupting the sync process.
By AkaButNice and Bypassi#7037
Named by Ashton Davies & Brandon421-ops (their github account is deleted???)
If your organization does not allow you to sign in without a network, you should instead prevent internet access on your network.
-
Powerwash. Press Ctrl+Alt+Shift+R on the sign-in screen and confirm, or press Esc + Refresh ↻, then press Power ⏻.
Press Ctrl+D on the recovery screen
Press Enter.
-
Sign in.
-
Immediately disconnect from your network.
-
Press Refresh ↻ + Power ⏻ to instant restart.
-
Sign in as an existing user.
-
Navigate to chrome://extensions.
-
Connect to your network.
-
Wait for the targetted extension to automatically install.
-
Immediately disconnect from your network and sign out.
-
Sign in again.
The extension should now be corrupted. You can check at chrome://extensions.
Blobwifi is an exploit that allows Chromebook users to 𝗿𝗲𝗺𝗼𝘃𝗲 𝗮𝗹𝗹 𝗼𝗳 𝘁𝗵𝗲 𝗿𝗲𝘀𝘁𝗿𝗶𝗰𝘁𝗶𝗼𝗻𝘀 𝗳𝗿𝗼𝗺 𝗮 𝗺𝗮𝗻𝗮𝗴𝗲𝗱 𝗪𝗶-𝗙𝗶 𝗻𝗲𝘁𝘄𝗼𝗿𝗸. It works similarly to another exploit, CAUB. (stops updates)
Created by Blobby
Download the HTML file and follow on-screen intrusctions from there
How it works/Original repository
𝗖𝗮𝘂𝗗𝗡𝗦 allows you to edit your wifi name servers to bypass extensions Created by Potato.
Download the HTML file or put the data: link into a new tab and follow on-screen instructions from there
You can change the name servers you want to set by clicking advanced on the top left. This may not work and just entirely make your wifi connected with no internet.
𝗖𝗵𝗿𝗼𝗺𝗲𝟭𝟬𝟬 allows you to revert to a previous version of chromeOS. Due to the complexity and details of this please visit https://chrome100.dev/guide Created by e9x
Extracts WIFI Password Created by luphoria
Must have access to chrome://net-export and chrome://policy
Visit https://luphoria.com/netlog-policy-password-tool and follow on-screen instructions
Allows you to open blocked websites with very simple steps.
Discovered By paxtoboss12
- Update your chromebook to the newest version
- Keep retrying to open a blocked website
- On the 3rd/4th try it will just let you in
If this didn't work then sit and cry in a corner or use the other methods.
Nothing much just a method on how to view your allowed extensions and blocked extensions
- Navigate to the url chrome://policy
- Search for any policy named
ExtensionAllowList
orExtensionBlockList
(or just search extension and see what you can find in the policy list) - View the properties of any of the two
You will see random letters which are actually the extension ids
- Copy any extension id and put in the url address bar
https://chromewebstore.google.com/detail/extensionidhere