Jiantao Li Profile
Jiantao Li

@CurseRed

Followers
2K
Following
1K
Media
44
Statuses
375

Security Researcher @starlabs_sg , playing CTF with @r3kapig

Joined February 2010
Don't wanna be here? Send us removal request.
@CurseRed
Jiantao Li
59 minutes
RT @starlabs_sg: CASE CLOSED: CVE-2025-29824.0 public samples, 0 information.Suspect: Windows CLFS driver.Crime: UAF leading to Privilege E….
0
6
0
@CurseRed
Jiantao Li
6 days
RT @starlabs_sg: One of our current intern, @goatmilkkk shared his Chrome-atic escape adventure using CVE-2024-30088.Epic obstacles documen….
0
55
0
@CurseRed
Jiantao Li
1 month
RT @r3kapig: 🎉 Last weekend we participated in bi0sCTF 2025 as r3kapig and secured first place! 🥇 Huge thanks to @teambi0s for organizing s….
0
7
0
@CurseRed
Jiantao Li
1 month
RT @starlabs_sg: When life gives you tangerines🍊.Intern Lin Ze Wei's task: Port a 2-bug exploit to Pixel 6 Pro.Problem: One bug "doesn't wo….
0
38
0
@CurseRed
Jiantao Li
1 month
RT @starlabs_sg: After 6 months of responsible disclosure, proud to announce our team discovered 13 (mostly exploitable) vulnerabilities in….
0
21
0
@CurseRed
Jiantao Li
2 months
RT @starlabs_sg: "Why is my exploit taking 10 minutes?" .*checks logs* .*sees 10,000 kernel warnings* .". oh" 💡. Fresh Friday night read:….
0
27
0
@CurseRed
Jiantao Li
2 months
RT @thezdi: Confirmed!! Dung and Nguyen (@MochiNishimiya) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validat….
0
15
0
@CurseRed
Jiantao Li
2 months
RT @_jsoo_: Big shoutout to @hi_im_d4rkn3ss & @gerrard_tai for flying over & represent us.To our 1st-timers Gerrard @cplearns2h4ck @MochiNi….
0
8
0
@CurseRed
Jiantao Li
2 months
RT @thezdi: Outstanding! Nguyen Hoang Thach (@hi_im_d4rkn3ss) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a fir….
0
47
0
@CurseRed
Jiantao Li
2 months
RT @thezdi: Nicely done! Billy (@st424204) and Ramdhan (@n0psledbyte) of STAR Labs used a UAF to perform their Docker Desktop escape and e….
0
19
0
@CurseRed
Jiantao Li
2 months
RT @thezdi: Confirmed! Chen Le Qi (@cplearns2h4ck) of STARLabs SG combined a UAF and an integer overflow to escalate to SYSTEM on #Windows….
0
13
0
@CurseRed
Jiantao Li
2 months
RT @starlabs_sg: Just dropped a blog post on a fun bug that our (former since it's reported long long time ago) intern, Devesh Logendran fo….
0
26
0
@CurseRed
Jiantao Li
2 months
RT @offbyoneconf: A big 🏆 win for @offbyoneconf 2025 first ever Speed Run CTP Challenge - zafirr!! ⚡ zafirr takes home the grand prize of….
0
5
0
@CurseRed
Jiantao Li
2 months
RT @ptrYudai: Just hosted a casual speedrun CTF with @_riatre and @CurseRed at @offbyoneconf, organized by @starlabs_sg!.Congrats to Zafirr….
0
7
0
@CurseRed
Jiantao Li
4 months
RT @starlabs_sg: CimFS: Crashing in memory, Finding SYSTEM! @cplearns2h4ck dug into Microsoft CimFS, found a sneaky 0-day, and guess what….
0
59
0
@CurseRed
Jiantao Li
4 months
RT @hulitw: 出事啦 Next.js.加一個 request header 就可以繞過 middleware 不執行😅.
0
12
0
@CurseRed
Jiantao Li
4 months
RT @starlabs_sg: STAR Labs Windows Exploitation Challenge Writeup.We're happy to announce that @Fr0st1706 solved our recent Windows exploit….
0
48
0
@CurseRed
Jiantao Li
5 months
RT @REverseConf: STAR Labs is a Bronze Sponsor of RE//verse! Based in Singapore, they help organizations strengthen their security against….
0
2
0
@CurseRed
Jiantao Li
5 months
RT @offbyoneconf: Get ready for an all-new challenge—a 🏃‍♂️Speed Run CTF, exclusively for @offbyoneconf attendees! Think fast, hack smart &….
0
12
0
@CurseRed
Jiantao Li
7 months
RT @starlabs_sg: Think you’ve got what it takes to pop shells and snag your ticket to. @REverseConf and @offbyoneconf ? 😏..
0
44
0