Moblig

659 posts

Moblig banner
Moblig

Moblig

@moblig_

#1 Hacker at BugCon LHE Mexico 2021 & 2022 | Top Ranked in H1 Mexico Leaderboard 2021, 2022, 2023, 2024 | Offensive Security Engineer | Co-Founder @ Ryft

127.0.0.1 Katılım Ağustos 2021
214 Takip Edilen8.3K Takipçiler
Sabitlenmiş Tweet
Moblig
Moblig@moblig_·
Yay, I was awarded a $16,300 bounty on @Hacker0x01! hackerone.com/moblig #TogetherWeHitHarder 🎉🎉🎉 Tip: Even if an asset asks for authentication, fuzz for endpoints using ffuf, I found an unauthenticated API that allowed me to retrieve sensitive information!
Moblig tweet media
English
43
86
1.1K
0
Moblig
Moblig@moblig_·
@ZeUsVuln You can join the waitlist in our homescreen and you'll receive an invite to your free trial soon!
English
0
0
0
50
Moblig
Moblig@moblig_·
🔴Two critical vulnerabilities, $5,000 in bounties.💰 Both were discovered while I built Ryft. Most EASM tools generate raw recon data. Ryft turns it into attack surface intelligence. I created a specific tier for security researchers👇 Join the waitlist: ryftsec.com #bugbountytips
Moblig tweet media
Ryft Security@ryftsec

Most EASM tools tell you a vulnerability *might* exist. Ryft actually verifies it. AI probes the finding, confirms exploitability, and removes false positives automatically. Discovery → scanning → validation in one platform. See it in action: ryftsec.com

English
3
5
116
11.1K
Moblig
Moblig@moblig_·
@Oluwakomiyo_ In the home screen -> scroll down to waitlist or access it from the menu in the rop right!
English
0
0
0
18
Ozzy
Ozzy@Oluwakomiyo_·
@moblig_ How can I join the waitlist??
English
1
0
0
16
Moblig
Moblig@moblig_·
@Oluwakomiyo_ Yep it's been launched, waitlist is for the free trials for the security researcher tier!
English
1
0
0
18
Ozzy
Ozzy@Oluwakomiyo_·
@moblig_ Has it being launched yet?
English
1
0
0
23
Moblig
Moblig@moblig_·
We're also working on something interesting.✴️ Ryft maps the full attack surface of a target and turns it into structured intelligence. *Researchers will be able to export that data and give their AI research agents full context about the target.* Instead of starting blind, the agent already understands the attack surface.
English
2
1
1
510
Moblig
Moblig@moblig_·
One feature that makes Ryft different from most EASMs: Recon Insights. Instead of just listing assets (subdomains, ports, tech stacks), Ryft analyzes the data and surfaces potential attack vectors. • exposed admin panels • risky services • vulnerable endpoints • takeover opportunities
Moblig tweet media
English
1
1
6
919
Moblig retweetledi
spencer
spencer@techspence·
The infosec/cybersecurity space is funny because on social media, AI is taking over the world. Then I go to conferences and meet people who are primarily defenders and talk to clients daily and they haven’t heard of OpenClaw, which is probably the biggest phenomenon since OpenAI launched ChatGPT. Social media is amazing and yes there is a certain pulse on culture and humanity that shows up first here, but not, it’s still very much a huge bubble.
English
38
20
341
27.3K
Moblig retweetledi
Kali Linux
Kali Linux@kalilinux·
Kali & LLM: macOS with Claude Desktop GUI & Anthropic Sonnet LLM: This post will focus on an alternative method of using Kali Linux, moving beyond direct terminal command execution. Instead, we will leverage a Large Language Model (LLM) to translate… kali.org/blog/kali-llm-…
Kali Linux tweet media
English
104
515
3.1K
781.3K
Moblig retweetledi
Dex
Dex@DexFi_·
This will make more sense in 2026-2027
English
162
3.5K
21.6K
898.9K
Moblig retweetledi
Moblig retweetledi
Moblig retweetledi
dawgyg - WoH
dawgyg - WoH@thedawgyg·
"HackerOne Agentic PTaaS pairs specially trained AI agents"... specially trained on a decade worth of work from the largest pool of bug hunters on the planet.... without their consent... Maybe its time to find out how class action suits work and see if we have any ability to prevent them from using our work?
HackerOne@Hacker0x01

Point-in-time pentests can’t keep up, while fully autonomous testing creates noise. The solution? HackerOne Agentic PTaaS pairs specially trained AI agents with elite human validation to deliver results based on real-world exploitability, not theory. This 50-second video shows you how it works.

English
16
31
288
29.8K
Moblig retweetledi
Autism Capital 🧩
Autism Capital 🧩@AutismCapital·
This is going to be a scam gold rush like we've never seen before. Facebook Boomers have NO Idea what's coming. They are TURBO COOKED. Warn your loved ones. This is a Hiroshima level event. Develop a safe word only you know with your circles. GOOD LUCK!!
English
794
2.9K
27.6K
4.7M
Moblig retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 Another CVSS 10.0 n8n vulnerability disclosed. Researchers found another critical flaw (CVE-2026-21858) in n8n that lets remote attackers take full control with no authentication required. The bug abuses Content-Type handling in form webhooks to read local files, steal secrets, forge admin sessions, and achieve RCE. 🔗 Details here → thehackernews.com/2026/01/critic…
The Hacker News tweet media
English
13
107
427
52.3K
Moblig retweetledi
React
React@reactjs·
There is critical vulnerability in React Server Components disclosed as CVE-2025-55182 that impacts React 19 and frameworks that use it. A fix has been published in React versions 19.0.1, 19.1.2, and 19.2.1. We recommend upgrading immediately. react.dev/blog/2025/12/0…
English
161
1K
4K
2.6M
Moblig retweetledi
Danielle Aminov
Danielle Aminov@AminovDanielle·
We were analyzing the new RSC vulnerability and its impact. RSC is a React feature, but most apps use it through Next.js, which bundles RSC widely. So it will likely surface most often as Next.js CVE-2025-66478. Patch snippet below 🧐 Initial analysis: wiz.io/blog/critical-…
Danielle Aminov tweet media
English
1
23
115
26K
Moblig retweetledi
Arturo Sustaita
Arturo Sustaita@arturo_io·
Hack, Talk & Drink T01EP11 En el siguiente episodio estaremos platicando con @moblig_ uno de los BugHunter Top en México. Acompáñanos en vivo por twitch.tv/4sus_ para aprender de su experiencia. Lunes 10 Nov 05:30pm GMT-6 08:30pm GMT-3
GIF
Español
0
3
8
822