ASUS Secure Boot Bypass
Secure Boot Bypass Method For Fortnite And Valorant
THESE STEPS TAKES 5 MINUTES AT MOST.
Make sure you already followed the ASUS Permanent Spoof Instructions
๐น STEP 2: Generate a GUID & store it.
Open Powershell as admin, write [Guid]::newGuid()and see the results. Take a picture of that GUID with your phone in case we might need it later. Not always necessary, just on some more specific Asus models. โ
๐น STEP 3: Boot Into BIOS. (Just like before)
HOW TO EASILY BOOT INTO BIOS: YOUTUBE TUTORIAL HERE!
๐น STEP 4: Secure Boot Configuration.
Go to Boot > Secure Boot > OS Type [Windows] & Secure Boot Mode [Custom]. Secure Boot mode can be found under "Boot configuration".
If there is no 'Secure Boot Mode', then it is not a problem! โ
NOTE: Ensure all Default keys are installed. If it shows "0" at all, click "Install Default Keys". This is important for our Secure Boot bypass, and for Fortnite & Valorant. โ ๏ธ

๐น STEP 5: KEK Management And Configuration.
Now open 'KEK Management' - Choose "Append key" option. - Choose "No" to load the EFI from a file on external media. - Choose USB file system. - Choose the "vgk.der" file. - Select the file format as "Public Key Certificate". - Enter the GUID (with hyphens) that you saved earlier then press enter. - Finally, press "Yes" to append KEK with content from the .der file.
YOU SHOULD SEE A 'SUCCESS' MESSAGE IF YOU DONE EVERYTHING CORRECTLY! Secure Boot has now been bypassed, and EFI Spoof without problems. โ
๐น STEP 6: DB Management And Configuration.
Do the same steps for 'DB Management' as you did for KEK Management.
๐น STEP 7: Boot Loader Configuration.
Now set "UEFI OS" Partition as Boot priority #1 and Windows Boot Manager as #2. Click save and exit bios again, we are done now. You will boot EFI spoofed.
Note: This process is important for ASUS users. You would ALWAYS have to boot Windows from the :/U Partition. You cannot play Valorant Or Fortnite without it. Sadly, there is no other way for this, other than buying a new non-Asus motherboard. ๐ช
Last updated
