Jiantao Li (@cursered) 's Twitter Profile
Jiantao Li

@cursered

Security Researcher @starlabs_sg , playing CTF with @r3kapig

ID: 115579136

linkhttps://blog.cal1.cn/ calendar_today19-02-2010 04:36:19

361 Tweet

2,2K Takipçi

384 Takip Edilen

Jacob Soo (@_jsoo_) 's Twitter Profile Photo

starlabs is organising Off-By-One Conference again on 8th May 2025. My team members are revamping several things including the website & adding new activities that are rare in SG conferences. Most likely it will be done after my holidays. Hope to see more submissions this year.

starlabs (@starlabs_sg) 's Twitter Profile Photo

🎄 All I Want for Christmas is a CVE-2024-30085 Exploit 🎄 As always, we at starlabs are sharing what we learnt. This time, it's brought to you by Cherie-Anne Lee starlabs.sg/blog/2024/all-…

Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

Get ready for an all-new challenge—a 🏃‍♂️Speed Run CTF, exclusively for Off-By-One Conference attendees! Think fast, hack smart & claim your spot at the top! Watch this space! Huge shoutout to our organizing team: Riatre ptr-yudai spaceraccoon | Eugene Lim Jiantao Li #OBO2025 #CTF

Get ready for an all-new challenge—a 🏃‍♂️Speed Run CTF, exclusively for <a href="/offbyoneconf/">Off-By-One Conference</a> attendees! Think fast, hack smart &amp; claim your spot at the top! Watch this space!
Huge shoutout to our organizing team: 
<a href="/_riatre/">Riatre</a> 
<a href="/ptrYudai/">ptr-yudai</a> 
<a href="/spaceraccoonsec/">spaceraccoon | Eugene Lim</a> 
<a href="/CurseRed/">Jiantao Li</a> 

#OBO2025 #CTF
RE//verse (@reverseconf) 's Twitter Profile Photo

STAR Labs is a Bronze Sponsor of RE//verse! Based in Singapore, they help organizations strengthen their security against evolving cyber threats. Learn more: starlabs.sg

starlabs (@starlabs_sg) 's Twitter Profile Photo

STAR Labs Windows Exploitation Challenge Writeup We're happy to announce that Frost solved our recent Windows exploitation challenge & earned a ticket to Off-By-One Conference ! 🎉 Full writeup here: starlabs.sg/blog/2025/03-s… Thank you to everyone who participated!

starlabs (@starlabs_sg) 's Twitter Profile Photo

CimFS: Crashing in memory, Finding SYSTEM! chiefpie dug into Microsoft CimFS, found a sneaky 0-day, and guess what? The fix by Microsoft was just locking the door 🔐on unprivileged users. 😂 Dive into the adventure with us: starlabs.sg/blog/2025/03-c…

Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

A big 🏆 win for Off-By-One Conference 2025 first ever Speed Run CTP Challenge - zafirr!! ⚡ zafirr takes home the grand prize of SGD512, sponsored by starlabs We hoped everyone had fun participating and immersing themselves in this historical challenge!

A big 🏆 win for <a href="/offbyoneconf/">Off-By-One Conference</a>  2025 first ever Speed Run CTP Challenge - zafirr!! ⚡ zafirr takes home the grand prize of SGD512, sponsored by <a href="/starlabs_sg/">starlabs</a> 
We hoped everyone had fun participating and immersing themselves in this historical challenge!
starlabs (@starlabs_sg) 's Twitter Profile Photo

Just dropped a blog post on a fun bug that our (former since it's reported long long time ago) intern, Devesh Logendran found in Visual Studio Code <= 1.89+ We hope you will have fun reading it. starlabs.sg/blog/2025/05-b…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! Chen Le Qi (chiefpie) of STARLabs SG combined a UAF and an integer overflow to escalate to SYSTEM on #Windows 11. He earns $30,000 and 3 Master of Pwn points. #Pwn2Own #P2OBerlin

Confirmed! Chen Le Qi (<a href="/cplearns2h4ck/">chiefpie</a>) of STARLabs SG combined a UAF and an integer overflow to escalate to SYSTEM on #Windows 11. He earns $30,000 and 3 Master of Pwn points. #Pwn2Own #P2OBerlin
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Nicely done! Billy (Billy) and Ramdhan (Ramdhan) of STAR Labs used a UAF to perform their Docker Desktop escape and execute code on the underlying OS. They earn $60,000 and 6 Master of Pwn Points.

Nicely done!  Billy (<a href="/st424204/">Billy</a>) and Ramdhan (<a href="/n0psledbyte/">Ramdhan</a>) of STAR Labs used a UAF to perform their Docker Desktop escape and execute code on the underlying OS.  They earn $60,000 and 6 Master of Pwn Points.
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Outstanding! Nguyen Hoang Thach (Thach Nguyen Hoang 🇻🇳) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin

Outstanding! Nguyen Hoang Thach (<a href="/hi_im_d4rkn3ss/">Thach Nguyen Hoang 🇻🇳</a>) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed!! Dung and Nguyen (Mochi Nishimiya) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validation of Array Index for the Windows privilege escalation. They earn $70,000 and 9 Master of Pwn points. #Pwn2Own

Confirmed!! Dung and Nguyen (<a href="/MochiNishimiya/">Mochi Nishimiya</a>) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validation of Array Index for the Windows privilege escalation. They earn $70,000 and 9 Master of Pwn points. #Pwn2Own
Jacob Soo (@_jsoo_) 's Twitter Profile Photo

Big shoutout to Thach Nguyen Hoang 🇻🇳 & Gerrard Tai for flying over & represent us To our 1st-timers Gerrard chiefpie Mochi Nishimiya for the awesome work To Ramdhan & Billy for guiding the next gen & piers Bruce Chen who are part of it Lets continue trying #Pwn2Own

starlabs (@starlabs_sg) 's Twitter Profile Photo

"Why is my exploit taking 10 minutes?" *checks logs* *sees 10,000 kernel warnings* "...oh" 💡 Fresh Friday night read: our intern, Tan Ze Jian, on Mali exploitation - sometimes the fix is simpler than you think! starlabs.sg/blog/2025/05-g…

starlabs (@starlabs_sg) 's Twitter Profile Photo

After 6 months of responsible disclosure, proud to announce our team discovered 13 (mostly exploitable) vulnerabilities in Samsung Exynos processors! Kudos to Billy, Ramdhan, [email protected] & rainbowpigeon CVE-2025-23095 to CVE-2025-23107 📍 semiconductor.samsung.com/support/qualit…

starlabs (@starlabs_sg) 's Twitter Profile Photo

When life gives you tangerines🍊 Intern Lin Ze Wei's task: Port a 2-bug exploit to Pixel 6 Pro Problem: One bug "doesn't work" Solution: Make it work with 1 bug Sometimes the best research comes from working with what you think you have starlabs.sg/blog/2025/06-s…

r3kapig (@r3kapig) 's Twitter Profile Photo

🎉 Last weekend we participated in bi0sCTF 2025 as r3kapig and secured first place! 🥇 Huge thanks to teambi0s for organizing such an amazing competition! 🙏 Congratulations to Project Sekai CTF for second place 🥈 and thehackerscrew for third place 🥉

🎉 Last weekend we participated in bi0sCTF 2025 as r3kapig and secured first place! 🥇 Huge thanks to <a href="/teambi0s/">teambi0s</a> for organizing such an amazing competition! 🙏 Congratulations to <a href="/ProjectSEKAIctf/">Project Sekai CTF</a>  for second place 🥈 and <a href="/thehackerscrew1/">thehackerscrew</a>  for third place 🥉