View Private Facebook Profile Picture in Full Size

Published by:

view facebook profile picture in full size
Hi Guys, In my opinion While using Facebook we usually search out Friends and visits several profiles.Sometimes we attract towards few Profiles.Make our mind to search about person who is beyond that particular profile.When we open it  our first aim to see the Profile Picture and we click it.'Opps ' nothing happen.Profile picture is in private mode.That means we are just able to see the profile Picture that usually  160x160 px , 200x200 px  in size or it may be vary.As we want to see the Profile Read more [...]

Transfer Files from Bluestacks to PC without Softwares

Published by:

transfer files from bluestacks to pc theme
Hello Guys,Its been a very long to be here.but no problem now I am here. Today this article gonna tell u how can you transfer files inside the bluestacks to a computer without any  software.you need a file manager (Hope already Installed ) that helps you to share files among different Apps and computer.You can get files in your File Manger at different locations.like if you want to share Images that you Clicked using camera and apps like Aviary would get in DCIM folder. Proper location of DCIM Read more [...]

Top 100 Best Hacking Tools that makes you a Real Hacker

Published by:

hackingbuzz 100 top hacking tools 1
Hello People ! Today I am gonna Tell you about Hacking Tools which are very powerful and dangerous.I think today I am gonna make your day.If you like this post please make a comment.I will be very glad ! .Ok so,Here is the list of  Top 100 Hacking Tools that Have been using by Hackers for more than a decade as well as new tools.Many old tools are Still in use and they have been upgrading  time to time.I have covered almost all type of Hacking Tools.Some tools are used for more than one purpose,so Read more [...]

45 Best Firefox Add-ons for Penetration Testers and Hackers

Published by:

firefox add-ons for penetration testers and hackers
Hi Guys !  Here is the list of best Firefox add-ons up-to now.These Firefox extensions are actually very powerful in finding vulnerabilities in webpages,web development,Hacking and what not.I just described a little bit about  all of these Firefox add-ons.Now its your turn to explore the functionality of each of these plugins.Open all of these add-ons links in firefox browser.so that, you could directly integrate these plugins into Firefox browser without downloading each of them.        Best Read more [...]

SHODAN – World’s Most Dangerous Computer Search Engine

Published by:

shodan word's most dangerous computer search engine
Hi guys.. Today we are gonna  play with a very strange and popular search engine "SHODAN". It is a Computer Search Engine designed by John Matherly. It is strange in the sense that It does not provide any content like Google,Yahoo,Bing ... Unlike these search Engines.It lets you search the Internet for Computers.It is the first computer search engine.It indexes Servers,Webcams,Printers,Routers and other devices that are connected to Internet.It also describe as the search engine for Service Banners,which Read more [...]

Webshag -Web Server Audit Tool on Backtrack 5

Published by:

webshag on backtrack 5 tutorial
Webshag is multi-threaded,multi-paltform web server audit tool.That's means it can run on different computers like windows,linux etc and capable of running multiple instructions at the same time.Basically it is written in python and gathers commonly useful functionalites for web server auditing like URL Scanning File Fuzzing Website Crawling Port Scanning It provides both GUI (Graphical User Interface) and Command Line Interface. Both the Interfaces are pre-installed on backtrack Read more [...]

Hunt Rootkits with Rootkit Hunter Tool (rkhunter)

Published by:

rootkits hunt rkhunter
rkhunter (Rootkits WASTER)  is a Unix based tool that scans backdoor,rootkits and local exploits.It does this by comparing SHA-1 hashes of important files with the good ones in the online database,searching for default directories(rootkits),hidden files,wrong permissions,suspicious strings in kernel modules.These are the tests run by rkhunter. - MD5 hash compare - Look for default files used by rootkits - Wrong file permissions for binaries - Look for suspected strings in LKM and KLD modules - Read more [...]

Build Apps without any Programming Skills in Minutes

Published by:

build apps without programming skills
Here at Hackingbuzz,I am going to tell you how you can build apps for free and without any need of coding skills ? I am not talking about any mediocre stuff.You can really build attractive and awesome apps.now you can get the jump on the others with the awesome applications and share it with world.Also you need not to study comprehensive books to create apps.you just need to think outside the box and show your creativity to world in minutes.Literally speaking,It is the new era for app developers Read more [...]

Secure Facebook Account by Using Antivirus Apps

Published by:

secure facebook by using antivirus
Several Antivirus Companies claim to secure Facebook account  by launching their antivirus apps for facebook.These applications protect against Facebook scams,bogus links,malicious apps and what not.These antivirus applications scan user profile and all the links coming from friends and pages.Along with news feed they also take care of other spammy applications that may be dangerous for your privacy,security and reputation.These applications are free to use. Secure Facebook from Social Networking Read more [...]