kylebot Profile
kylebot

@ky1ebot

Followers
6K
Following
899
Media
10
Statuses
219

CTF player @Shellphish | PhD Student @ASU | @angrdothorse dev | Author of how2heap | Vulnerability Research Hobbyist | @[email protected]

Tempe, AZ
Joined September 2018
Don't wanna be here? Send us removal request.
@ky1ebot
kylebot
1 month
Another year, another Linux PE at TyphoonPwn ;).
@typhooncon
TyphoonCon🌪️
1 month
Verification of another Linux PE is complete, and we’re now in talks with the vendor. Excellent discovery - well done! #TyphoonCon25.
2
3
96
@ky1ebot
kylebot
27 days
But yeah, the race window is so small that it is not practically exploitable.
1
0
4
@ky1ebot
kylebot
27 days
And clearly my report was not shared with the patch developer that they think taprio_change cannot race with advance_sched (written in the comment).
0
0
4
@ky1ebot
kylebot
27 days
This is interesting. I exploited and reported this kernel bug at pwn2own in March last year and it got patched after more than half a year in Oct. And to this day, there is no mention that it is exploitable. Btw, the patch only reduces race window.
2
13
103
@ky1ebot
kylebot
3 months
We are so back! @shellphish
Tweet media one
0
6
94
@ky1ebot
kylebot
11 months
RT @shellphish: WE QUALIFIED FOR AIxCC FINALS!!!!
0
31
0
@ky1ebot
kylebot
1 year
Just confirmed that I first blooded the bounty! Will write a blog about it when Google allows it :).
@GoogleVRP
Google VRP (Google Bug Hunters)
1 year
The V8 Sandbox is now in scope for Chrome VRP for bypass submissions, meeting specific criteria, with rewards up to $5,000! .Please see the Chrome VRP rules [ for full submission criteria and eligibility details.
9
4
163
@ky1ebot
kylebot
1 year
Found a V8 sandbox bypass during @PlaidCTF . Let's see whether I will be the first one claiming the bounty 👀.
@GoogleVRP
Google VRP (Google Bug Hunters)
1 year
The V8 Sandbox is now in scope for Chrome VRP for bypass submissions, meeting specific criteria, with rewards up to $5,000! .Please see the Chrome VRP rules [ for full submission criteria and eligibility details.
8
12
277
@ky1ebot
kylebot
1 year
I'm so proud to have attended the event with the best hackers in the world! (And appeared for 0.5s in the cool video! :) ) It was really fun! Thanks Google! And @sirdarckcat !.
@GoogleVRP
Google VRP (Google Bug Hunters)
1 year
bugSWAT live hacking 📣: We are planning two events this year, one in the US and one in Europe. Invites based on recent submissions and past bugSWAT performance. More details soon - keep those bug reports coming!. Here's a peek into our last bugSWAT:
0
4
42
@ky1ebot
kylebot
1 year
RT @Zardus: Hello Hackers! The inaugural #pwncollege Quarterly Quiz is LIVE at It’s a series of tough kernel pwnin….
0
15
0
@ky1ebot
kylebot
1 year
RT @SCAI_ASU: Hey hey! #SCAI doctoral student @ky1ebot just walked off with $20K! A PhD team supervised by @___tiffanyb___ is working hard….
0
4
0
@ky1ebot
kylebot
1 year
I did it again! It was fun to work on exploit one night before the event and one shot it at the demonstration!.And thank you @thezdi and @ubuntu for making the report process painless!.
@thezdi
Trend Zero Day Initiative
1 year
Validated! Kyle Zeng from ASU SEFCOM brought a race condition to #Pwn2Own and successfully used it to escalate privileges on #Ubuntu desktop. He earns $20,000 and 2 Master of Pwn points. #P2OVancouver
Tweet media one
13
8
172
@ky1ebot
kylebot
1 year
deadline fighter be like: arrive at Vancouver one night before on-stage demonstration for #Pwn2Own and yet to fine-tune the exploit reliability for physical machines :D.
1
0
43
@ky1ebot
kylebot
1 year
Let's do this again, Shellphishers!.
@DARPA
DARPA
1 year
Congrats to the 7 companies that will receive $1 million each to develop AI-enabled cyber reasoning systems that automatically find and fix software vulnerabilities as part of the #AIxCC Small Business Track! Full announcement:
Tweet media one
1
1
41
@ky1ebot
kylebot
1 year
And CVE-2021-46940 is even for tools. I'm sorry, it is not even in the kernel. And "it must be run be run as root". And the direct impact is "prevents the timer from update the stat". I'm not sure why this is a security bug.
2
1
16
@ky1ebot
kylebot
1 year
Great. Now memory leaks, warnings, bugs in components not exposed to non-root users (CVE-2021-46957), even performance issue patches ( CVE-2024-26602) are "security bugs".
@spendergrsec
Brad Spengler
1 year
Happy Wednesday! Hope you're all enjoying the 86 CVEs assigned by the Linux CNA today:
3
5
60
@ky1ebot
kylebot
1 year
My favorite fuzzing paper in recent years:.SoK: Prudent Evaluation Practices for Fuzzing.
0
19
98
@ky1ebot
kylebot
1 year
RT @jinmo123: Also. to also lightly summarize what I wanted to say in the flare-on stream via a twitter thread, 1. if IDA splits functions….
0
13
0
@ky1ebot
kylebot
1 year
RT @_tsuro: The first #v8CTF submission is now public:. Note that the current flag is still up for grabs, maybe M11….
0
57
0
@ky1ebot
kylebot
2 years
I'm going to present our paper "RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections" at @acm_ccs this afternoon. Get excited, fellow hackers! .
4
26
158