// WHOAMI
HACKERCHEN
Security Researcher
•
CTF Player
•
Developer
root@cyberlog:~# cat /var/lib/bio.txt
> 南京工业大学在读,热衷于底层逻辑与漏洞挖掘。
> 从脚本小子进化为全栈安全研究员。
> 正在构建自动化渗透框架 SubHunter。
> 目标:攻破不可能,防御不可见。
> 从脚本小子进化为全栈安全研究员。
> 正在构建自动化渗透框架 SubHunter。
> 目标:攻破不可能,防御不可见。
root@cyberlog:~#
"There is no patch for human stupidity.
Security is not a product, but a process."
Security is not a product, but a process."
CAPABILITY MATRIX
// SKILL_DISTRIBUTIONCYBER ARSENAL
// TOOLS_OF_TRADE
Burp Suite
Web Analysis
Metasploit
Exploitation
Cobalt Strike
C2 Framework
Wireshark
Packet Analysis
IDA Pro
Reverse Eng
Nmap
Recon
Kali Linux
OS
Docker
Container
CERTIFICATIONS
// CREDENTIALSOS
OSCP
OffSec Certified Professional
CEH
CEH v12
Certified Ethical Hacker
CIS
CISSP
In Progress...
CHRONOLOGY
// EXECUTION_LOG
2026 - CURRENT
Nanjing University of Technology
专注于 CTF 进阶与实战攻防。发布个人博客 CyberLog,开源 SubHunter 工具。在各大 SRC 平台提交高危漏洞。
2025
Deep Dive into Binary
系统性学习 Pwn 与逆向工程。深入理解堆栈溢出、ROP 链构造。Hack The Box 达到 Hacker 级别。
2024
Initialization
接触网络安全,配置 Kali Linux 环境。学习 Python 与计算机网络基础。完成第一次 SQL 注入实验。
guest@cyberlog:~# ./contact_me.sh
[+] Establish secure connection...
[+] Available Channels:
1. Email: contact@hackerchen.com
2. GitHub: github.com/Hackerchen716
3. Blog: cyberlog.io
# Waiting for input...
[+] Available Channels:
1. Email: contact@hackerchen.com
2. GitHub: github.com/Hackerchen716
3. Blog: cyberlog.io
# Waiting for input...
guest@cyberlog:~#