Jiantao Li
@cursered
Security Researcher @starlabs_sg , playing CTF with @r3kapig
ID: 115579136
https://blog.cal1.cn/ 19-02-2010 04:36:19
361 Tweet
2,2K Takipçi
384 Takip Edilen
Get ready for an all-new challenge—a 🏃♂️Speed Run CTF, exclusively for Off-By-One Conference attendees! Think fast, hack smart & claim your spot at the top! Watch this space! Huge shoutout to our organizing team: Riatre ptr-yudai spaceraccoon | Eugene Lim Jiantao Li #OBO2025 #CTF
Just hosted a casual speedrun CTF with Riatre and Jiantao Li at Off-By-One Conference, organized by starlabs! Congrats to Zafirr for taking first place!
Outstanding! Nguyen Hoang Thach (Thach Nguyen Hoang 🇻🇳) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin
Confirmed!! Dung and Nguyen (Mochi Nishimiya) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validation of Array Index for the Windows privilege escalation. They earn $70,000 and 9 Master of Pwn points. #Pwn2Own
Big shoutout to Thach Nguyen Hoang 🇻🇳 & Gerrard Tai for flying over & represent us To our 1st-timers Gerrard chiefpie Mochi Nishimiya for the awesome work To Ramdhan & Billy for guiding the next gen & piers Bruce Chen who are part of it Lets continue trying #Pwn2Own
After 6 months of responsible disclosure, proud to announce our team discovered 13 (mostly exploitable) vulnerabilities in Samsung Exynos processors! Kudos to Billy, Ramdhan, [email protected] & rainbowpigeon CVE-2025-23095 to CVE-2025-23107 📍 semiconductor.samsung.com/support/qualit…
🎉 Last weekend we participated in bi0sCTF 2025 as r3kapig and secured first place! 🥇 Huge thanks to teambi0s for organizing such an amazing competition! 🙏 Congratulations to Project Sekai CTF for second place 🥈 and thehackerscrew for third place 🥉