starlabs (@starlabs_sg) 's Twitter Profile
starlabs

@starlabs_sg

A Singapore company that discovers vulnerabilities to help customers mitigate the risks of cyber attacks. Organisers of @offbyoneconf

ID: 1040514456415952896

linkhttps://starlabs.sg calendar_today14-09-2018 08:15:53

243 Tweet

7,7K Followers

16 Following

Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

Last 7 DAYS LEFT to submit to our Off-By-One 2025 CFP! Got something exciting to share? Nowโ€™s your chance to speak at the conference. โฐ Time is ticking! offbyone.sg/cfp Letโ€™s make this unforgettable! #OBO2025 #Singapore

Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

๐Ÿ—ฃ๏ธ๐’๐ข๐ง๐ ๐š๐ฉ๐จ๐ซ๐ž๐š๐ง ๐ฌ๐ญ๐ฎ๐๐ž๐ง๐ญ๐ฌ in tertiary institutions! ๐Ÿ†“๐…๐‘๐„๐„ Off-by-One Conference student tickets up for grabs! ๐Ÿ†“Sponsored by INTfinity Consulting Register at forms.gle/o4XVzBeBf8Lewvโ€ฆ, by 12 April 2025. More information: linkedin.com/posts/off-by-oโ€ฆ

๐Ÿ—ฃ๏ธ๐’๐ข๐ง๐ ๐š๐ฉ๐จ๐ซ๐ž๐š๐ง ๐ฌ๐ญ๐ฎ๐๐ž๐ง๐ญ๐ฌ in tertiary institutions! 

๐Ÿ†“๐…๐‘๐„๐„ Off-by-One Conference student tickets up for grabs!
๐Ÿ†“Sponsored by <a href="/INTfinitySG/">INTfinity Consulting</a> 

Register at forms.gle/o4XVzBeBf8Lewvโ€ฆ, by 12 April 2025.
More information: linkedin.com/posts/off-by-oโ€ฆ
starlabs (@starlabs_sg) 's Twitter Profile Photo

A huge thank you to INTfinity Consulting for sponsoring student tickets and making it possible for more young talents to attend. Your support helps nurture the next generation of cybersecurity professionals.

starlabs (@starlabs_sg) 's Twitter Profile Photo

Just dropped a blog post on a fun bug that our (former since it's reported long long time ago) intern, Devesh Logendran found in Visual Studio Code <= 1.89+ We hope you will have fun reading it. starlabs.sg/blog/2025/05-bโ€ฆ

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! Chen Le Qi (chiefpie) of STARLabs SG combined a UAF and an integer overflow to escalate to SYSTEM on #Windows 11. He earns $30,000 and 3 Master of Pwn points. #Pwn2Own #P2OBerlin

Confirmed! Chen Le Qi (<a href="/cplearns2h4ck/">chiefpie</a>) of STARLabs SG combined a UAF and an integer overflow to escalate to SYSTEM on #Windows 11. He earns $30,000 and 3 Master of Pwn points. #Pwn2Own #P2OBerlin
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Nicely done! Billy (Billy) and Ramdhan (Ramdhan) of STAR Labs used a UAF in the Linux kernel to perform their Docker Desktop escape and execute code on the underlying OS. They earn $60,000 and 6 Master of Pwn Points.

Nicely done!  Billy (<a href="/st424204/">Billy</a>) and Ramdhan (<a href="/n0psledbyte/">Ramdhan</a>) of STAR Labs used a UAF in the Linux kernel to perform their Docker Desktop escape and execute code on the underlying OS.  They earn $60,000 and 6 Master of Pwn Points.
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Outstanding! Nguyen Hoang Thach (Thach Nguyen Hoang ๐Ÿ‡ป๐Ÿ‡ณ) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin

Outstanding! Nguyen Hoang Thach (<a href="/hi_im_d4rkn3ss/">Thach Nguyen Hoang ๐Ÿ‡ป๐Ÿ‡ณ</a>) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! Gerrard Tai of STAR Labs SG Pte. Ltd used a Use-After-Free bug to escalate privileges on Red Hat Enterprise Linux. Their third-round win earns them $10,000 and 2 Master of Pwn points.

Confirmed! Gerrard Tai of STAR Labs SG Pte. Ltd used a Use-After-Free bug to escalate privileges on Red Hat Enterprise Linux. Their third-round win earns them $10,000 and 2 Master of Pwn points.
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed!! Dung and Nguyen (Mochi Nishimiya) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validation of Array Index for the Windows privilege escalation. They earn $70,000 and 9 Master of Pwn points. #Pwn2Own

Confirmed!! Dung and Nguyen (<a href="/MochiNishimiya/">Mochi Nishimiya</a>) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validation of Array Index for the Windows privilege escalation. They earn $70,000 and 9 Master of Pwn points. #Pwn2Own
Jacob Soo (@_jsoo_) 's Twitter Profile Photo

Big shoutout to Thach Nguyen Hoang ๐Ÿ‡ป๐Ÿ‡ณ & Gerrard Tai for flying over & represent us To our 1st-timers Gerrard chiefpie Mochi Nishimiya for the awesome work To Ramdhan & Billy for guiding the next gen & piers Bruce Chen who are part of it Lets continue trying #Pwn2Own

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Pwn2Own Berlin 2025 comes to a close. We awarded $1,078,750 for 28 unique 0-days. Congrats to starlabs for winning Master of Pwn with $320,000. Thanks to offensivecon for hosting, and thanks to all who participated. Can't wait to see you next year! #Pwn2Own #P2OBerlin

Pwn2Own Berlin 2025 comes to a close. We awarded $1,078,750 for 28 unique 0-days. Congrats to <a href="/starlabs_sg/">starlabs</a> for winning Master of Pwn with $320,000. Thanks to <a href="/offensive_con/">offensivecon</a> for hosting, and thanks to all who participated. Can't wait to see you next year! #Pwn2Own #P2OBerlin
starlabs (@starlabs_sg) 's Twitter Profile Photo

"Why is my exploit taking 10 minutes?" *checks logs* *sees 10,000 kernel warnings* "...oh" ๐Ÿ’ก Fresh Friday night read: our intern, Tan Ze Jian, on Mali exploitation - sometimes the fix is simpler than you think! starlabs.sg/blog/2025/05-gโ€ฆ

starlabs (@starlabs_sg) 's Twitter Profile Photo

After 6 months of responsible disclosure, proud to announce our team discovered 13 (mostly exploitable) vulnerabilities in Samsung Exynos processors! Kudos to Billy, Ramdhan, [email protected] & rainbowpigeon CVE-2025-23095 to CVE-2025-23107 ๐Ÿ“ semiconductor.samsung.com/support/qualitโ€ฆ

starlabs (@starlabs_sg) 's Twitter Profile Photo

After almost 8 months of coordinated disclosure, vulnerabilities in Trend Micro Apex Central discovered by our former colleague Jia Hao have been resolved! ZDI advisories: ZDI-25-295, ZDI-25-296, ZDI-25-297, ZDI-25-236, ZDI-25-237

starlabs (@starlabs_sg) 's Twitter Profile Photo

When life gives you tangerines๐ŸŠ Intern Lin Ze Wei's task: Port a 2-bug exploit to Pixel 6 Pro Problem: One bug "doesn't work" Solution: Make it work with 1 bug Sometimes the best research comes from working with what you think you have starlabs.sg/blog/2025/06-sโ€ฆ