Billy
@st424204
Security Researcher @starlabs_sg
Pwn2Own Vancouver 2024,2023,2022,2021
Pwn2Own Austin 2023,2021
ID: 2168709300
01-11-2013 16:22:05
209 Tweet
1,1K Followers
93 Following
Oh my! In a #Pwn2Own first, Nguyen Hoang Thach (Thach Nguyen Hoang 🇻🇳) of STARLabs SG was able to go from guest to host on #VMware ESXi. Amazing work. He's off to the disclosure room to provide the details. #P2OBerlin
Outstanding! Nguyen Hoang Thach (Thach Nguyen Hoang 🇻🇳) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin
konata.github.io/posts/samsung-… Samsung’s ISVP: Betraying the Trust of Security Researchers Samsung Mobile
Just amazing. Dung and Nguyen (Mochi Nishimiya) of STARLabs not only demonstrated their guest-to-host exploit of #Oracle VirtualBox, they added on a Windows kernel vulnerability to take over the system. Tremendous work. They head off to disclosure with the details. #Pwn2Own
Confirmed!! Dung and Nguyen (Mochi Nishimiya) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validation of Array Index for the Windows privilege escalation. They earn $70,000 and 9 Master of Pwn points. #Pwn2Own
Big shoutout to Thach Nguyen Hoang 🇻🇳 & Gerrard Tai for flying over & represent us To our 1st-timers Gerrard chiefpie Mochi Nishimiya for the awesome work To Ramdhan & Billy for guiding the next gen & piers Bruce Chen who are part of it Lets continue trying #Pwn2Own
After 6 months of responsible disclosure, proud to announce our team discovered 13 (mostly exploitable) vulnerabilities in Samsung Exynos processors! Kudos to Billy, Ramdhan, [email protected] & rainbowpigeon CVE-2025-23095 to CVE-2025-23107 📍 semiconductor.samsung.com/support/qualit…
I couldn't be prouder of our security research team! 13 CVEs in Samsung Exynos processors. This is what happens when you give them the freedom to push boundaries. Thankful to Billy, Ramdhan, [email protected] for guiding our intern rainbowpigeon