One-Time Download · Instant Access

The Personal Threat
Assessment Kit

The plug-and-play system to find out what hackers already know about you — and shut it down today. Written by a Certified Ethical Hacker with IBM X-Force Red background.

Trusted by hundreds of everyday people
CEH Certified
IBM X-Force Red Background
No technical knowledge needed
Total value: $65
$29
One-time · Instant download
Personal Threat Assessment Kit
10 AI Prompts (Bonus)
Emergency Response Checklist (Bonus)
Personal Security Playbook (Bonus)
Monthly Security Routine (Bonus)
Get Instant Access — $29

🔒 Secure checkout · PDF download · No subscription

Most people have no idea what's out there about them.

And that's exactly what makes them easy targets. I've spent my career breaking into systems for banks and financial companies to show them where they're vulnerable. This kit takes that same hacker mindset and puts it in your hands — so you can see what an attacker sees when they look at you.

1 in 3
Americans have been victims of identity theft
$1,343
Average out-of-pocket cost per identity theft victim
200 hrs
Average time spent resolving identity theft

Everything in the $29 Bundle

Five documents. One complete system. Total value: $65.

CORE KIT62 pages$29 value

Personal Threat Assessment Kit

The Plug-and-Play System to Find Out What Hackers Already Know About You — And Shut It Down Today

This is the engine of the whole kit. A fill-in-the-blank system that walks you through a complete personal security audit in under 60 minutes — no technical background required.

Fill-In-The-Blank Threat Scorecard — your full personal security audit in under 60 minutes
7 Copy-and-Paste AI Prompts — drop into ChatGPT or Claude to uncover your hidden exposure
Done-For-You Fix-It Templates — opt-out emails, privacy settings scripts, password migration plan
Platform-by-Platform Privacy Lockdown Guides — Instagram, Facebook, Google, Venmo, LinkedIn (click-for-click)
15-Minute Monthly Security Routine — a repeatable system so you never fall behind
"What a Hacker Sees When They Google You" — a real walkthrough of how attackers build your profile
BONUS 11-page quick reference$9 value

10 AI Prompts to Find Your Exposed Info Online

Copy-paste prompts written in Cecile's no-fluff, hacker-minded style

Ten ready-to-use prompts you drop directly into ChatGPT or Claude. Each one is designed to surface a specific type of exposure — from data broker profiles to forgotten accounts to how a social engineer would target you.

Find Your Breach Exposure — check every email you've ever used
Run a Data Broker Sweep — find and opt out of people-search sites
Do a Personal OSINT Audit — see what strangers can find about you
Scan One Platform at a Time — full privacy audit per social network
Map Your Address Exposure — find everywhere your home address appears
Find Your Forgotten Accounts — surface old accounts still holding your data
Check Your Phone Permissions — flag apps that shouldn't have access
Detect Password Reuse — find weak, reused, and breached passwords
Build a 30-Day Cleanup Plan — a week-by-week action plan
Simulate an Attacker's View — see exactly how a social engineer would target you
BONUS 26 pages$9 value

Emergency Response Checklist

What To Do In The First 60 Minutes If You Get Hacked

Most people waste hours doing the wrong things when they get hacked. This checklist tells you exactly what to do, in what order, starting right now — so you stop the damage fast.

Minute 0–5: Stop the Bleeding — change passwords, enable 2FA, log out all sessions
Minute 5–15: Lock Down Connected Accounts — email, bank, check for forwarding rules
Minute 15–30: Check for Financial Damage — bank accounts, credit cards, freeze credit at all 3 bureaus
Minute 30–45: Secure Your Devices — malware scan, check connected devices, remove unfamiliar apps
Credit freeze contacts for Equifax, Experian, and TransUnion
The one step most people skip that lets attackers keep reading your emails even after you change your password
BONUS 37 pages$9 value

Personal Security Playbook

The Complete Guide to Hardening Your Digital Life

Written by an ethical hacker, not a marketing team. This playbook covers every layer of your digital life — from email and passwords to devices, networks, social media, and financial accounts.

Chapter 1: Email Security — the 3-email system that keeps your finances separate from your social life
Chapter 2: Password Security — the weekend migration plan to get every account into a password manager
Hacker's Insights — real attacker tactics explained in plain English for each chapter
Recommended tools for each category — free and paid options
Exact settings to change, not vague advice
Each chapter builds on the last — work through it in order
BONUS 4Printable checklist$9 value

Monthly Security Routine

A 15-Minute Repeatable System So You Never Fall Behind

Security isn't a one-time fix — it's a habit. This monthly checklist keeps you protected without turning it into a full-time job. Fifteen minutes, once a month, and you stay ahead of 99% of threats.

Monthly breach check — verify your emails haven't appeared in new breaches
App permission audit — review and revoke unnecessary access
Password health check — identify weak or reused passwords
Software update sweep — ensure all devices and apps are current
Social media privacy review — settings change without warning
Printable format — stick it on your fridge or save it to your phone

This kit is for you if…

You've ever reused a password across multiple accounts
You have no idea what data brokers know about you
You've received a suspicious email and weren't sure if it was real
You've never done a full audit of your social media privacy settings
You want to protect your family but don't know where to start
You've been in a data breach and didn't know what to do
You want to know what a hacker would find if they Googled you right now

"Fair warning: some of what you find might make you uncomfortable. That's not a bug — it's the feature."

If it makes you uneasy, imagine how a scammer feels when they find the same information. The difference? You're about to shut it down.

CM
Cecile Mengue
CEH · IBM X-Force Red · @CecileHackx

Frequently Asked Questions

Instant Access · No Subscription

Stop making it easy
for them.

One prevented breach pays for this kit hundreds of times over. Get the complete bundle for a one-time $29 — no subscription, no upsell, just the tools you need.

Total value: $65
$29
5 documents · Instant PDF download
Get Instant Access — $29 →

🔒 Secure checkout · PDF download · No subscription required

Want ongoing protection? See the Hacker-Proof Membership →

CecileHackX

© 2024 CecileHackX · cecilehackx.com · by Cecile Mengue · @CecileHackx