🌀Dnsdumpster :- dns recon & research , find & lookup dns records

🌀Verify email address :- Verify email address online using free email verification tool.

🌀ZOOMEY :- find iot device and bugs in android WordPress PHPMyAdmin and much more

🌀Search CVE List :- Common Vulnerabilities and Exposures (CVE®) is a list of entries — each containing an identification number, a description, and at least one public reference — for publicly known cybersecurity vulnerabilities.

🌀NATIONAL VULNERABILITY DATABASE :- NVD is the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables the automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security-related software flaws, misconfigurations, product names, and impact metrics

🌀GREYNOISE :- GreyNoise Intelligence is a cyber security company that collects, labels, and analyzes Internet-wide scan and attack data.

🌀SEEBUG 1 :- You can find bugs here

🌀SHODAN :- Shodan is the world’s first search engine for Internet-connected devices. … Use Shodan to discover which of your devices are connected to the Internet,

🌀Website Vulnerability Scanner :- The Web Vulnerability Scanner finds website vulnerabilities like SQLi, XSS, server misconfiguration and many more. Use our Website Scanner to check your web security.

🌀Hack This Site :- HackThisSite! is a legal and safe network security resource where users test their hacking skills on various challenges and learn about hacking and network security. Also provided are articles, comprehensive and active forums, and guides and tutorials. Learn how to hack!“

Hacking Basics

🔰What is Hacking🔰

In the cyber security world, the person who is able to find the weakness of the system and exploit it for his reason(Good or bad) is referred to as a hacker and the process is called hacking.

Hacking is not just about hacking someones facebook account or hacking games, that’s still a part of hacking but it’s just a micron of the whole thing… So keep this I mind before we get hacking.

🔰Types of Hackers🔰

🌀 1. Script Kiddie🌀

are the hackers who copy other people’s work and use their software, not hacking themselves.

🌀 2. White hat hackers🌀

are hackers who hack into systems for good proposes and are hackers who work for companies to protect their websites or systems from hackers.

🌀 3. Black hat hackers🌀

are hackers who hack systems and websites for malicious reasons.

🌀 4. Grey hat hackers🌀

are hackers who neither hack for good or bad purposes, they stay neutral, but can become either at any time.

🌀 5. Hacktivists🌀

are hackers who use their hacking skills to protest,
Well know you know the types of hackers, now you choose your path.

🗃 What Is Identity Theft? 🗳

Identity theft is a two-step process. First, someone steals your personal information.

Second, the thief uses that information to impersonate you and commit fraud.

Of course, stealing your personal information isn’t the worst of the crime; it’s the second part of this process that does the most harm , using your information to commit credit card fraud, mortgage and utilities scams; and leave you with emptied bank accounts.