# TPM Spoof Guide

## Step 1 — Run the Checker

1. Locate the file **`Checker.bat`**.
2. Run the file.

The script will display your **current system serials**.

Example information displayed may include:

* Motherboard Serial
* BIOS Serial
* TPM Information
* System UUID

> 💡 Make sure the command window fully loads so all serials are visible.

***

## Step 2 — Save Your Serials

Before continuing, you should **back up your serial information**.

#### How to save them

1. Open **Snipping Tool** or another screenshot application.
2. Capture the entire window showing the serial information.
3. Save the screenshot to a **secure location**.

Recommended locations:

* Desktop
* Downloads
* Private backup folder

> ⚠️ **Do not skip this step.** These serials may be required later.

***

## Step 3 — Disable Secure Boot (Temporary)

You must temporarily disable Secure Boot before continuing.

#### Steps

1. Restart your computer.
2. Enter the **BIOS/UEFI menu**.
3. Locate **Secure Boot settings**.
4. Set **Secure Boot → Disabled**.
5. Save changes and exit BIOS.

Your system will now boot normally into **Windows**.

> 🔁 After completing the spoof process, you can **re-enable Secure Boot** if required.

***

## Step 4 — Prepare Ventoy USB

You will need a **USB drive prepared with Ventoy**.

#### Requirements

* USB drive
* Ventoy installer

#### Install [Ventoy](https://mega.nz/file/KQACwTiI#yuDNsftDJltOkNMY1jRNFF8EqLdllOGBZnd9QMiui8k)

1. Insert your **USB drive**.
2. Download **Ventoy2Disk**.
3. Open **Ventoy2Disk**.
4. Select your **USB device**.
5. Click **Install**.

> ⚠️ Installing Ventoy will **erase all data on the USB drive**.

Once completed, your USB drive will be ready to boot **Ventoy-based tools**.

***

![](https://guide.sys-info.xyz/cloak/~gitbook/image?url=https%3A%2F%2F4288668587-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-x-prod.appspot.com%2Fo%2Fspaces%252FLO0rLYaQbrBaChV3CVBB%252Fuploads%252FpzWDDhglCpThN485Nw9U%252Fimage%2520%2865%29.png%3Falt%3Dmedia%26token%3D28a181c9-00de-4b27-923e-44d7654780b1\&width=768\&dpr=3\&quality=100\&sign=baa664b1\&sv=2)

1.

```
## Step 1 — Open PowerShell
```

````
1. Press **Windows Key**
2. Search for **PowerShell**
3. Right-click **Windows PowerShell**
4. Select **Run as Administrator**

## Step 2 — Clear the TPM

In the PowerShell window, run the following command:

```
clear-tpm
```

Press **Enter** to execute the command.

> ⚠️ Your system may prompt you to **confirm TPM clearing on the next reboot**.

## Step 3 — Download the TPM Spoof ISO

1. Make sure your **Ventoy USB drive is still plugged in**.
2. Download the **TPM Spoof ISO file**.

> 📥 The download can be found in **Step 3 —** [**Time To Perm!**](https://surge-tool-solutions.gitbook.io/untitled/~/revisions/u675Z5jm5wCO9wdN2q9k/part-3-spoofing/time-to-perm) of the guide.

3. Save the **ISO file directly to the USB drive**.

> 💡 Ventoy allows you to boot ISO files directly without extracting them.

## Step 4 — Boot Into Ventoy

To boot into the Ventoy menu:

1. Hold **SHIFT**
2. Click **Restart** from the Windows power menu

This will open the **Advanced Boot Options menu**.\
![](https://2416666537-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fb3FEjgTO4V5zBxmpncKB%2Fuploads%2FbowHXAbfXMiKdJ5O90o6%2Fimage.png?alt=media\&token=06bd0f53-9d76-47f7-a786-42dc50cfb229)

## Step 5 — Boot From USB

1. Select **Use a Device**
2. Choose your **USB drive**
3. The **Ventoy boot menu** will appear
4. Select the **TPM Spoof ISO** you copied earlier\
   ![](https://2416666537-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fb3FEjgTO4V5zBxmpncKB%2Fuploads%2F8bHldUUoRf1hmSfea4AV%2Fimage.png?alt=media\&token=498a1a69-579a-445a-b3ce-fe440c40d6ac)
````

### Run TPM Script (Linux Enviornment) <a href="#run-tpm-script-linux-enviornment" id="run-tpm-script-linux-enviornment"></a>

645B[tpm.rar](https://4288668587-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLO0rLYaQbrBaChV3CVBB%2Fuploads%2FLQsay5FeupXTIshSrYta%2Ftpm.rar?alt=media\&token=08474704-f124-48b1-82de-0fe425b4b410)<a class="button secondary">Download</a><a href="https://4288668587-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLO0rLYaQbrBaChV3CVBB%2Fuploads%2FLQsay5FeupXTIshSrYta%2Ftpm.rar?alt=media&#x26;token=08474704-f124-48b1-82de-0fe425b4b410" class="button secondary">Open</a>

1. On the Linux desktop, download the provided **tpm package**.
2. Extract if needed.
3. Double-click **tpm.sh**.
4. Open it in **Terminal** and run it.
5. Wait for the process to finish.
6. Boot back into Windows.

### Re-Enable Secure Boot <a href="#re-enable-secure-boot" id="re-enable-secure-boot"></a>

1. Boot into **BIOS** again.
2. Re-enable **Secure Boot** using the same path as before.
3. You may now remove the USB.

**Do NOT clear TPM again**, or the spoof will be undone

### Prepare TPM <a href="#prepare-tpm" id="prepare-tpm"></a>

1. Press **Win + R**.
2. Type:

   <a class="button secondary">Copy</a>

   ```
   tpm.msc
   ```
3. Select **Prepare TPM**.

![](https://guide.sys-info.xyz/cloak/~gitbook/image?url=https%3A%2F%2F4288668587-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-x-prod.appspot.com%2Fo%2Fspaces%252FLO0rLYaQbrBaChV3CVBB%252Fuploads%252FWkNx9lqX5XwaFOiwES8k%252Fimage%2520%2868%29.png%3Falt%3Dmedia%26token%3D05cf3e1c-a38c-4d4c-b50f-e5e3768467c3\&width=768\&dpr=3\&quality=100\&sign=fa77a1dd\&sv=2)

### Verify TPM Change <a href="#verify-tpm-change" id="verify-tpm-change"></a>

1. **Verify the Changes** After restarting your PC:
   * Run the `Checker.bat` file again to view your updated serials.
   * Compare the new serials with the screenshot of your old serials to ensure the changes have been applied successfully.
2. Compare the **PublicKeyHash** with the one you saved earlier.
