ext-remover.net
Open in
urlscan Pro
172.67.192.153
Public Scan
Submitted URL: http://ext-remover.net/
Effective URL: https://ext-remover.net/
Submission Tags: suspect
Submission: On June 08 via api from BR — Scanned from DE
Effective URL: https://ext-remover.net/
Submission Tags: suspect
Submission: On June 08 via api from BR — Scanned from DE
Form analysis
0 forms found in the DOMText Content
ext remover Exploits Tools Blogs Discussions About JavaScript is not enabled in this browser. More Information CHROME OS ALL 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 FILTER HAS BEEN SET AUTOMATICALLY. EXTENSION 106 LTBEEF Disable extensions none JPCMG Disable extensions with service workers 115 INGOT FOR IBOSS Ingot designed for the iBoss extension 111 LOMOH Disable extensions using the locked mode feature 115 LTMEAT Freeze extensions with debug URLs none LTMEAT [FLOOD] Freeze extensions naturally by flooding extension pages none LTMEAT [PRINT] Freeze extensions temporarily with the print dialog none DEXTENSIFY Freeze extensions temporarily by flooding iframes in a webpage none CROSH & VMC DISABLE EXTENSIONS Powerwash & block automatic extension installation none CORKEY Corrupt extensions 115 SWAMP Run scripts on privileged extensions none INSECURLY Toggle the Securly extension none KILLCURLY Kill extensions by signing out 115 BLANK3R Reload extensions continuously none CHAOS Bypass Hapara Highlights & Hapara Filter 115 EXTENSION INSTALLER Install extensions while the Chrome Web Store is blocked SCRIPT EXECUTION none URUN Execute scripts with the "uBlock Origin" extension none SNAP&RUN Execute scripts with the "Snap&Read" extension WEBVIEW 115 INCOGNITO Open a window in Incognito mode 115 QUICKVIEW Universal webview utilizing the QuickOffice component extension none BUYPASS Open blocked sites with the PaymentRequest API none BAGHDAD Browse in the captive portal window on the sign-in screen SYSTEM 111 SH1MMER Unenroll with an RMA shim 119 CRYPTOSMITE Unenroll with stateful files 118 FAKEMURK Re-enroll with developer mode & enable USB boot in verified mode 111 SHIMBOOT Boot Debian Linux without unenrolling or modifying firmware none TERRAOS Boot Linux-based operating systems from an RMA shim 118 ENTERPRISE ENROLLMENT GLITCH Bypass enrollment setup 121 SKIOVOX Use Chrome in a kiosk profile 121 TR3NCH Execute scripts in Chrome pages with SKIOVOX Breakout & Sh0vel none DOWNGRADE Revert to a previous version none POLLEN User policy editor none CAUB Prevent automatic updates HARDWARE none PENCIL METHOD Unenroll by bridging pins on the motherboard PROXY none CAUDNS Block requests from certain filtering extensions and set custom name servers none OMADADNS Block requests from certain filtering extensions none ALPHABETIC Cloaking proxy launcher Hidden SAMPLE Short description Details Nothing to see here... yet :/ Moving version selection and adding policy filters. Light Dark CLOAKING None Empty Google Drive Docs Classroom CUSTOMIZATION Hide thumbnails EXT-REMOVER EXT-REMOVER contains a collection of exploits discovered by various users to expand the capability of managed Chromebooks, making it easy to find the information you need. Exploit details, code, and styles have been modified for a better user experience. Disclaimers: This service is not designed to encourage time wasting. Use these only in your free time, and do not let them lead to distraction. Property of your organization should always be returned in its proper condition.Continue