ext-remover.net Open in urlscan Pro
172.67.192.153  Public Scan

Submitted URL: http://ext-remover.net/
Effective URL: https://ext-remover.net/
Submission Tags: suspect
Submission: On June 08 via api from BR — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

  ext remover
     
Exploits
Tools
Blogs
Discussions
About

JavaScript is not enabled in this browser.

More Information


CHROME OS ALL 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106
105 104 103 102
FILTER HAS BEEN SET AUTOMATICALLY.


EXTENSION

106



LTBEEF

Disable extensions
none



JPCMG

Disable extensions with service workers
115



INGOT FOR IBOSS

Ingot designed for the iBoss extension
111



LOMOH

Disable extensions using the locked mode feature
115



LTMEAT

Freeze extensions with debug URLs
none



LTMEAT [FLOOD]

Freeze extensions naturally by flooding extension pages
none



LTMEAT [PRINT]

Freeze extensions temporarily with the print dialog
none



DEXTENSIFY

Freeze extensions temporarily by flooding iframes in a webpage
none



CROSH & VMC DISABLE EXTENSIONS

Powerwash & block automatic extension installation
none



CORKEY

Corrupt extensions
115



SWAMP

Run scripts on privileged extensions
none



INSECURLY

Toggle the Securly extension
none



KILLCURLY

Kill extensions by signing out
115



BLANK3R

Reload extensions continuously
none



CHAOS

Bypass Hapara Highlights & Hapara Filter
115



EXTENSION INSTALLER

Install extensions while the Chrome Web Store is blocked


SCRIPT EXECUTION

none



URUN

Execute scripts with the "uBlock Origin" extension
none



SNAP&RUN

Execute scripts with the "Snap&Read" extension


WEBVIEW

115



INCOGNITO

Open a window in Incognito mode
115



QUICKVIEW

Universal webview utilizing the QuickOffice component extension
none



BUYPASS

Open blocked sites with the PaymentRequest API
none



BAGHDAD

Browse in the captive portal window on the sign-in screen


SYSTEM

111



SH1MMER

Unenroll with an RMA shim
119



CRYPTOSMITE

Unenroll with stateful files
118



FAKEMURK

Re-enroll with developer mode & enable USB boot in verified mode
111



SHIMBOOT

Boot Debian Linux without unenrolling or modifying firmware
none



TERRAOS

Boot Linux-based operating systems from an RMA shim
118



ENTERPRISE ENROLLMENT GLITCH

Bypass enrollment setup
121



SKIOVOX

Use Chrome in a kiosk profile
121



TR3NCH

Execute scripts in Chrome pages with SKIOVOX Breakout & Sh0vel
none



DOWNGRADE

Revert to a previous version
none



POLLEN

User policy editor
none



CAUB

Prevent automatic updates


HARDWARE

none



PENCIL METHOD

Unenroll by bridging pins on the motherboard


PROXY

none



CAUDNS

Block requests from certain filtering extensions and set custom name servers
none



OMADADNS

Block requests from certain filtering extensions
none



ALPHABETIC

Cloaking proxy launcher
Hidden



SAMPLE

Short description
Details
Nothing to see here... yet :/
Moving version selection and adding policy filters.
Light Dark


CLOAKING

None Empty Google Drive Docs Classroom


CUSTOMIZATION

Hide thumbnails

EXT-REMOVER

EXT-REMOVER contains a collection of exploits discovered by various users to
expand the capability of managed Chromebooks, making it easy to find the
information you need.

Exploit details, code, and styles have been modified for a better user
experience.

Disclaimers: This service is not designed to encourage time wasting. Use these
only in your free time, and do not let them lead to distraction. Property of
your organization should always be returned in its proper condition.Continue