Billy (@st424204) 's Twitter Profile
Billy

@st424204

Security Researcher @starlabs_sg
Pwn2Own Vancouver 2024,2023,2022,2021
Pwn2Own Austin 2023,2021

ID: 2168709300

calendar_today01-11-2013 16:22:05

209 Tweet

1,1K Followers

93 Following

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! Chen Le Qi (chiefpie) of STARLabs SG combined a UAF and an integer overflow to escalate to SYSTEM on #Windows 11. He earns $30,000 and 3 Master of Pwn points. #Pwn2Own #P2OBerlin

Confirmed! Chen Le Qi (<a href="/cplearns2h4ck/">chiefpie</a>) of STARLabs SG combined a UAF and an integer overflow to escalate to SYSTEM on #Windows 11. He earns $30,000 and 3 Master of Pwn points. #Pwn2Own #P2OBerlin
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

After a dramatic pause in getting things setup Billy(Billy) and Ramdhan(Ramdhan) of STAR Labs preformed a Docker Desktop escape to pop calc - and they are also now off to the disclosure room - good luck! #Pwn2Own #P2OBerlin

After a dramatic pause in getting things setup Billy(<a href="/st424204/">Billy</a>) and Ramdhan(<a href="/n0psledbyte/">Ramdhan</a>) of STAR Labs preformed a Docker Desktop escape to pop calc - and they are also now off to the disclosure room - good luck!  #Pwn2Own #P2OBerlin
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Nicely done! Billy (Billy) and Ramdhan (Ramdhan) of STAR Labs used a UAF to perform their Docker Desktop escape and execute code on the underlying OS. They earn $60,000 and 6 Master of Pwn Points.

Nicely done!  Billy (<a href="/st424204/">Billy</a>) and Ramdhan (<a href="/n0psledbyte/">Ramdhan</a>) of STAR Labs used a UAF to perform their Docker Desktop escape and execute code on the underlying OS.  They earn $60,000 and 6 Master of Pwn Points.
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Oh my! In a #Pwn2Own first, Nguyen Hoang Thach (Thach Nguyen Hoang 🇻🇳) of STARLabs SG was able to go from guest to host on #VMware ESXi. Amazing work. He's off to the disclosure room to provide the details. #P2OBerlin

Oh my! In a #Pwn2Own first, Nguyen Hoang Thach (<a href="/hi_im_d4rkn3ss/">Thach Nguyen Hoang 🇻🇳</a>) of STARLabs SG was able to go from guest to host on #VMware ESXi. Amazing work. He's off to the disclosure room to provide the details. #P2OBerlin
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Outstanding! Nguyen Hoang Thach (Thach Nguyen Hoang 🇻🇳) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin

Outstanding! Nguyen Hoang Thach (<a href="/hi_im_d4rkn3ss/">Thach Nguyen Hoang 🇻🇳</a>) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! Gerrard Tai of STAR Labs SG Pte. Ltd used a Use-After-Free bug to escalate privileges on Red Hat Enterprise Linux. Their third-round win earns them $10,000 and 2 Master of Pwn points.

Confirmed! Gerrard Tai of STAR Labs SG Pte. Ltd used a Use-After-Free bug to escalate privileges on Red Hat Enterprise Linux. Their third-round win earns them $10,000 and 2 Master of Pwn points.
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Just amazing. Dung and Nguyen (Mochi Nishimiya) of STARLabs not only demonstrated their guest-to-host exploit of #Oracle VirtualBox, they added on a Windows kernel vulnerability to take over the system. Tremendous work. They head off to disclosure with the details. #Pwn2Own

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed!! Dung and Nguyen (Mochi Nishimiya) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validation of Array Index for the Windows privilege escalation. They earn $70,000 and 9 Master of Pwn points. #Pwn2Own

Confirmed!! Dung and Nguyen (<a href="/MochiNishimiya/">Mochi Nishimiya</a>) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validation of Array Index for the Windows privilege escalation. They earn $70,000 and 9 Master of Pwn points. #Pwn2Own
Jacob Soo (@_jsoo_) 's Twitter Profile Photo

Big shoutout to Thach Nguyen Hoang 🇻🇳 & Gerrard Tai for flying over & represent us To our 1st-timers Gerrard chiefpie Mochi Nishimiya for the awesome work To Ramdhan & Billy for guiding the next gen & piers Bruce Chen who are part of it Lets continue trying #Pwn2Own

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Pwn2Own Berlin 2025 comes to a close. We awarded $1,078,750 for 28 unique 0-days. Congrats to starlabs for winning Master of Pwn with $320,000. Thanks to offensivecon for hosting, and thanks to all who participated. Can't wait to see you next year! #Pwn2Own #P2OBerlin

Pwn2Own Berlin 2025 comes to a close. We awarded $1,078,750 for 28 unique 0-days. Congrats to <a href="/starlabs_sg/">starlabs</a> for winning Master of Pwn with $320,000. Thanks to <a href="/offensive_con/">offensivecon</a> for hosting, and thanks to all who participated. Can't wait to see you next year! #Pwn2Own #P2OBerlin
starlabs (@starlabs_sg) 's Twitter Profile Photo

After 6 months of responsible disclosure, proud to announce our team discovered 13 (mostly exploitable) vulnerabilities in Samsung Exynos processors! Kudos to Billy, Ramdhan, [email protected] & rainbowpigeon CVE-2025-23095 to CVE-2025-23107 📍 semiconductor.samsung.com/support/qualit…

Jacob Soo (@_jsoo_) 's Twitter Profile Photo

I couldn't be prouder of our security research team! 13 CVEs in Samsung Exynos processors. This is what happens when you give them the freedom to push boundaries. Thankful to Billy, Ramdhan, [email protected] for guiding our intern rainbowpigeon

Bruce Chen (@bruce30262) 's Twitter Profile Photo

Made a pwn challenge for this year’s HITCON CTF, which required participants to bypass PAC, BTI, and deal with relative vtables. Here’s the write-up: bruce30262.github.io/hitcon-ctf-202… Check it out if you're interested🙂

Pumpkin 🎃 (@u1f383) 's Twitter Profile Photo

Last weekend, I participated in corCTF and solved the Android Pwn challenge - corphone. It was a great challenge, and I learned a lot from it. Here's my write-up :) u1f383.github.io/android/2025/0…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! starlabs used a heap based buffer overflow to exploit the CanonUSA imageCLASS MF654Cdw. They earn themselves $20,000 and 2 Master of Pwn points. #Pwn2Own #P2OIreland

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

🎶 Mic drop! piers of STAR Labs SG just hacked the Sonos Era 300 at #Pwn2Own. That’s a chart-topper! They are off to the disclosure room to drop the needle on how they played that tune. #P2OIreland

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

📢 Confirmed! dmdung (piers) used a single OOB access bug to exploit the Sonos Era 300 smart speaker. In doing so, he earns $50,000 and 5 Master of Pwn points. #Pwn2Own

📢 Confirmed! dmdung (<a href="/_piers2/">piers</a>) used a single OOB access bug to exploit the <a href="/Sonos/">Sonos</a> Era 300 smart speaker. In doing so, he earns $50,000 and 5 Master of Pwn points. #Pwn2Own