CYBERLOG
HackerChen Avatar
// WHOAMI

HACKERCHEN

Security Researcher CTF Player Developer
root@cyberlog:~# cat /var/lib/bio.txt
> 南京工业大学在读,热衷于底层逻辑与漏洞挖掘。
> 从脚本小子进化为全栈安全研究员。
> 正在构建自动化渗透框架 SubHunter
> 目标:攻破不可能,防御不可见。
root@cyberlog:~#
"There is no patch for human stupidity.
Security is not a product, but a process."

CAPABILITY MATRIX

// SKILL_DISTRIBUTION
WEB EXPLOITATION95%
SQLi, XSS, SSRF, Deserialization, SSTI
BINARY / PWN85%
Stack/Heap Overflow, ROP, Format String, GDB
DEVELOPMENT90%
Python, Go, JavaScript, PHP, Bash Scripting
INTERNAL NETWORK75%
AD域渗透, Kerberos, Cobalt Strike, Tunneling

CYBER ARSENAL

// TOOLS_OF_TRADE
🦊 Burp Suite Web Analysis
🐍 Metasploit Exploitation
⚔️ Cobalt Strike C2 Framework
🦈 Wireshark Packet Analysis
🔬 IDA Pro Reverse Eng
🗺️ Nmap Recon
🐉 Kali Linux OS
🐳 Docker Container

CERTIFICATIONS

// CREDENTIALS

OSCP

OffSec Certified Professional

CEH v12

Certified Ethical Hacker

CISSP

In Progress...

CHRONOLOGY

// EXECUTION_LOG
2026 - CURRENT

Nanjing University of Technology

专注于 CTF 进阶与实战攻防。发布个人博客 CyberLog,开源 SubHunter 工具。在各大 SRC 平台提交高危漏洞。

2025

Deep Dive into Binary

系统性学习 Pwn 与逆向工程。深入理解堆栈溢出、ROP 链构造。Hack The Box 达到 Hacker 级别。

2024

Initialization

接触网络安全,配置 Kali Linux 环境。学习 Python 与计算机网络基础。完成第一次 SQL 注入实验。

guest@cyberlog:~# ./contact_me.sh
[+] Establish secure connection...
[+] Available Channels:

1. Email: contact@hackerchen.com
2. GitHub: github.com/Hackerchen716
3. Blog: cyberlog.io

# Waiting for input...
guest@cyberlog:~#