
kylebot
@ky1ebot
Followers
6K
Following
899
Media
10
Statuses
219
CTF player @Shellphish | PhD Student @ASU | @angrdothorse dev | Author of how2heap | Vulnerability Research Hobbyist | @[email protected]
Tempe, AZ
Joined September 2018
Another year, another Linux PE at TyphoonPwn ;).
Verification of another Linux PE is complete, and we’re now in talks with the vendor. Excellent discovery - well done! #TyphoonCon25.
2
3
96
Just confirmed that I first blooded the bounty! Will write a blog about it when Google allows it :).
The V8 Sandbox is now in scope for Chrome VRP for bypass submissions, meeting specific criteria, with rewards up to $5,000! .Please see the Chrome VRP rules [ for full submission criteria and eligibility details.
9
4
163
Found a V8 sandbox bypass during @PlaidCTF . Let's see whether I will be the first one claiming the bounty 👀.
The V8 Sandbox is now in scope for Chrome VRP for bypass submissions, meeting specific criteria, with rewards up to $5,000! .Please see the Chrome VRP rules [ for full submission criteria and eligibility details.
8
12
277
I'm so proud to have attended the event with the best hackers in the world! (And appeared for 0.5s in the cool video! :) ) It was really fun! Thanks Google! And @sirdarckcat !.
bugSWAT live hacking 📣: We are planning two events this year, one in the US and one in Europe. Invites based on recent submissions and past bugSWAT performance. More details soon - keep those bug reports coming!. Here's a peek into our last bugSWAT:
0
4
42
RT @Zardus: Hello Hackers! The inaugural #pwncollege Quarterly Quiz is LIVE at It’s a series of tough kernel pwnin….
0
15
0
RT @SCAI_ASU: Hey hey! #SCAI doctoral student @ky1ebot just walked off with $20K! A PhD team supervised by @___tiffanyb___ is working hard….
0
4
0
I did it again! It was fun to work on exploit one night before the event and one shot it at the demonstration!.And thank you @thezdi and @ubuntu for making the report process painless!.
Validated! Kyle Zeng from ASU SEFCOM brought a race condition to #Pwn2Own and successfully used it to escalate privileges on #Ubuntu desktop. He earns $20,000 and 2 Master of Pwn points. #P2OVancouver
13
8
172
Let's do this again, Shellphishers!.
Congrats to the 7 companies that will receive $1 million each to develop AI-enabled cyber reasoning systems that automatically find and fix software vulnerabilities as part of the #AIxCC Small Business Track! Full announcement:
1
1
41