
starlabs
@starlabs_sg
A Singapore company that discovers vulnerabilities to help customers mitigate the risks of cyber attacks. Organisers of @offbyoneconf
ID: 1040514456415952896
https://starlabs.sg 14-09-2018 08:15:53
243 Tweet
7,7K Followers
16 Following



๐ฃ๏ธ๐๐ข๐ง๐ ๐๐ฉ๐จ๐ซ๐๐๐ง ๐ฌ๐ญ๐ฎ๐๐๐ง๐ญ๐ฌ in tertiary institutions! ๐๐ ๐๐๐ Off-by-One Conference student tickets up for grabs! ๐Sponsored by INTfinity Consulting Register at forms.gle/o4XVzBeBf8Lewvโฆ, by 12 April 2025. More information: linkedin.com/posts/off-by-oโฆ


A huge thank you to INTfinity Consulting for sponsoring student tickets and making it possible for more young talents to attend. Your support helps nurture the next generation of cybersecurity professionals.




Outstanding! Nguyen Hoang Thach (Thach Nguyen Hoang ๐ป๐ณ) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin



Confirmed!! Dung and Nguyen (Mochi Nishimiya) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validation of Array Index for the Windows privilege escalation. They earn $70,000 and 9 Master of Pwn points. #Pwn2Own


Big shoutout to Thach Nguyen Hoang ๐ป๐ณ & Gerrard Tai for flying over & represent us To our 1st-timers Gerrard chiefpie Mochi Nishimiya for the awesome work To Ramdhan & Billy for guiding the next gen & piers Bruce Chen who are part of it Lets continue trying #Pwn2Own



After 6 months of responsible disclosure, proud to announce our team discovered 13 (mostly exploitable) vulnerabilities in Samsung Exynos processors! Kudos to Billy, Ramdhan, [email protected] & rainbowpigeon CVE-2025-23095 to CVE-2025-23107 ๐ semiconductor.samsung.com/support/qualitโฆ



Off-By-One Conference 2025 Day 1 presentation videos are now available on our official YouTube channel! Subscribe, like ๐ and comment! lnkd.in/gi5jQBi4


Off-By-One Conference 2025 Day 2 presentation videos are now available on our official YouTube channel! Subscribe, like ๐ and comment! lnkd.in/geDcTSsr


