this doesn't make a lot of sense to me but uh here you go.

What it does

i wrote none of this

The Fog

Introduced on v112, prevents downgrading.

The Tsunami

Introduced on v114, prevents you from disabling WP.

WP

Write protect, the thing that protects you from writing to the device.

Downgrading

Lowering your version to do certain exploits that were previously patched.

Recover

A process done to remove ChromeOS and then reinstall it via a USB. (removes everything software related then reinstalls it.)

RMA/Factory shim

A tool used by technicians to do various diagnostic tests and do motherboard replacements easier. (very easy to modify, sh1mmer modified rma shims to achieve unenrollment)

Sh1mmer

Multitool jailbreak allowing you to unblock Developer Mode, unenroll your chromebook, access a root bash shell, and more. The exploit modifies RMA shims.

Unenroll

Making your school chromebook act as it is completely yours by doing some sort of exploit.

Developer Mode

Something that you can activate to get full root access to the system. Activate it by doing: ESC+REFRESH+POWER, CTRL+D, ENTER, CTRL+D

Fakemurk

Fakemurk is a tool made by Mercury Workshop intended for use on a already unenrolled chromebook. It will allow you to re-enroll, making your chromebook appear identical to an enrolled one, except keep developer mode, and even boot off a linux USB, all while tricking chromeOS into thinking you're in verified mode, so your chromebook will not show up any different from the hundreds of other chromebooks in your enterprise's google admin console.

VPD/Vital Product Data

Vital Product Data (VPD) refers to a set of system-specific configuration data that is stored on the firmware of a chromebook devices. VPD contains information about the hardware configuration, serial numbers, asset tags, and other system-specific details of the device.

Killcurly

A exploit capable of stopping certain extensions from functioning, made by zoroark on discord, this is exploit uses Chrome's forgotten url.
DM Aka, but nice#5094 on discord if the link below is blocked, I don't want to talk about the other link publicly.

By using this exploit, we are not held accountable for any actions of this because of this use.

Steps:
Go to chrome://settings/signOut
Click the blue link, and visit chrome://restart

Cookie Dough Exploit (Extension Corruption)

This exploit can corrupt extensions, Securly, Securly Classroom, and Hapara in question. This is the most dangerous one yet, proceed at your own will, we are not held accountable of any causes/actions of this

To start, drag this code into your bookmark bar, then if you have Securly, go to securly.com and run the bookmarklet in the prompt put 50, if you have hapara, go to hapara.com or any block page, and use the bookmarklet and also put 50. Credit to the owners of this exploit!

PBSL

This is a more safer option and works for most extensions
Any actions caused by this are not our fault, we specifcally said "This is a more safer option" not 100% safe.

If you have one of these below, continue
Securly =>https://tinyurl.com/bettergoofcurly(You may have to reload)
iBoss => https://tinyurl.com/goofboss
Blocksi => https://tinyurl.com/goofsi
Cisco Umbrella => https://tinyurl.com/goofumbrella
Impero => https://tinyurl.com/goofimpero
Securly Classroom => https://tinyurl.com/goofclassroom


On each of these links, it should be a block page or something else, there should be a button in which opens a blank page, bookmark the code at here then return to the blank page and run it.