Quicksilver
https://github.com/AerialiteLabs/GoodSilver
Quicksilver is an unenrollment exploit for Kernver 6.
By emerwyi, soap phia
This is persistent if you’re on an unpatched version (<=v142)! If you’re not updated & want to re-enroll run
Section titled “This is persistent if you’re on an unpatched version ! If you’re not updated & want to re-enroll run vpd -i RW_VPD -d "re_enrollment_key" in any shell”
Quicksilver is an unenrollment exploit for Kernver 6.
By emerwyi, soap phia
Quicksilver - unenrollment from v125 - v142 (kv4 - kv6)
Section titled “Quicksilver - unenrollment from v125 - v142 (kv4 - kv6)”Quicksilver is an exploit for ChromeOS devices allowing for unenrollment on devices v125 or above (kv4) and v142 or below (kv6) Don’t know what your ChromeOS version or kernver is? Check here
How to use
Section titled “How to use”If your device can boot SH1MMER (unkeyrolled):
Section titled “If your device can boot SH1MMER (unkeyrolled):”- Boot SH1MMER (make sure the version is from at least December 15th 2025)
- Open the payloads menu and run the quicksilver payload
- Go through setup, you should be unenrolled!!
-# if your version is from before December 15th 2025, run this command in the bash shell:
vpd -i RW_VPD -s re_enrollment_key="$(openssl rand -hex 32)". it will sayunable to write 'random state', ignore this
If your device cannot boot SH1MMER (keyrolled):
Section titled “If your device cannot boot SH1MMER (keyrolled):”- Do Sh1ttyExec
- Enable developer mode & then enter recovery mode again
- Boot a GoodSilver image and choose “Deprosivion”
- After it reboots, go through setup, you will be unenrolled!!