Hank Chen

653 posts

Hank Chen

Hank Chen

@Hank0438

Security Researcher ^ CTF Enthusiast

Katılım Ocak 2020
790 Takip Edilen172 Takipçiler
TwinkleStar03
TwinkleStar03@_twinklestar03·
It's been a pleasure working with the legendary Angelboy @scwuaptx Getting the chance to work alongside someone I've admired ever since I first stepped into the pwnable feels surreal!
TrendAI Zero Day Initiative@thezdi

Nice work! Angelboy & TwinkleStar03 (@scwuaptx & @_twinklestar03) of DEVCORE Research Team + DEVCORE Internship Program was able to exploit Microsoft Windows 11! If confirmed, they win $30,000 and 3 Master of Pwn points. They're off to the disclosure room to explain how they did it. #Pwn2Own #P2OBerlin

English
2
0
16
1.4K
Hank Chen retweetledi
udp
udp@udp_ctf·
The glibc cycle continues lol.. Unsafe -> implement safety features -> safety features slow -> circumvent safety features in order to get speed -> unsafe github.com/shellphish/how…
English
0
26
163
9.1K
Hank Chen retweetledi
kqx
kqx@kqx_io·
played DiceCTF quals and managed to blood the kernel pwn challenge and won the $150 bounty! check out the writeup: kqx.io/writeups/corne…
kqx tweet media
English
1
24
188
11.4K
Hank Chen retweetledi
Anthropic
Anthropic@AnthropicAI·
We partnered with Mozilla to test Claude's ability to find security vulnerabilities in Firefox. Opus 4.6 found 22 vulnerabilities in just two weeks. Of these, 14 were high-severity, representing a fifth of all high-severity bugs Mozilla remediated in 2025.
Anthropic tweet media
English
480
1.4K
15.1K
3.2M
Hank Chen retweetledi
NiNi
NiNi@terrynini38514·
I found a vulnerability in Oracle VirtualBox (CVE-2026-21957) back in September 2025. It can be turned into AAR/AAW, and then escaping the VM is pretty easy. I originally planned to find a vulnerability for Pwn2Own, but since I found the vuln in September, sitting on a practical vuln for that long didn’t feel very ethical, so I eventually reported it to ZDI. But I still finished the exploitation + demo video as practice.
English
28
165
1.4K
92.4K
Hank Chen retweetledi
TrendAI Zero Day Initiative
Verified! @hank0438 of InnoEdge Labs exploited an exposed dangerous method against the Alpitronic HYC50 – Lab Mode, earning $40,000 USD and 4 Master of Pwn points. #Pwn2Own #P2OAuto
TrendAI Zero Day Initiative tweet mediaTrendAI Zero Day Initiative tweet media
English
1
2
15
4.4K
Hank Chen retweetledi
NiNi
NiNi@terrynini38514·
Just published an IDA plugin: HappyIDA Built with @h3xr4bb1t and @scwuaptx , and I’ve been using it in my daily reversing work for 1~2 years. There’s still a lot to do, but it felt like the right time to make it public, so we’re more likely to fix things (and hopefully some kind stranger will help us) It’s fancy, but not that fancy. Honestly, IDA Pro would be better if they adopted some of these ideas. There is no complex algorithms, no timeless debugger, no symbolic execution, but just a bunch of tiny features that have already helped me speed up reversing a lot. (The screenshot shows the origin of the project and the first feature I implemented: parameter labeling. @h3xr4bb1t later made it much more powerful. The SEH highlighter was made by @scwuaptx, and the SEH rebuilder was made by @h3xr4bb1t) github: github.com/HappyIDA/Happy…
NiNi tweet media
English
1
69
405
29.3K
Hank Chen retweetledi
Hank Chen retweetledi
Hank Chen retweetledi
0xdf
0xdf@0xdf_·
Holiday CTFs are here! Intro video about Advent of Code and my approach this year. (And check out flagvent.org and the Sans Holiday Hack as well). youtube.com/watch?v=JmiunE…
YouTube video
YouTube
English
1
5
34
5.1K
Hank Chen retweetledi
dudcom
dudcom@dudcom3·
@pwncollege is doing Advent of Pwn ! Everyone should check it out 🤓 We’re excited to announce that our first-ever Advent of Pwn kicks off on Sunday, November 30, 2025 at 7:00 PM (in 5 days) at pwn.college/advent-of-pwn!
English
0
15
70
7.3K
Hank Chen retweetledi
Zuk
Zuk@ihackbanme·
My estimation is that MTE will be bypassed by the end of the year. ismtebypassed.com Since Apple invested 100s+ man years in MTE, this will hopefully be the final attempt to secure the OS on their own and will finally open up the platform to more eyes. #FreeTheSandbox
English
3
6
65
9.6K
Hank Chen retweetledi
Ido Veltzman
Ido Veltzman@Idov31·
If you wanted to show a party trick to your friend or just leak kernel addresses via admin privileges you can use this repository: github.com/Idov31/EtwLeak… Since it can only leak addresses and only using administrative privileges, it isn't breaking a security boundary. 1/3
English
1
32
129
9.1K
Hank Chen retweetledi
Linux Kernel Security
Linux Kernel Security@linkersec·
kernelCTF: CVE-2025-38477 kernelCTF entry for a race condition in the network scheduler subsystem. Most notably, shows a technique of putting controlled data into unmapped sections of vmlinux. github.com/n132/security-…
Linux Kernel Security tweet media
English
5
19
99
6.3K
Hank Chen retweetledi
Octoberfest7
Octoberfest7@Octoberfest73·
I think this is kinda neat. Wanted an alternative to calling NtContinue so I created this small (and incomplete) stand in function that will populate the registers I care about and then pivot to Ctx->Rip via ROP
Octoberfest7 tweet media
English
1
17
127
7.5K
Hank Chen retweetledi
jro
jro@junr0n·
I bypassed user approvals and achieved RCE in VS Code Copilot by flipping 4 bits. Find out how: jro.sg/CVEs/copilot/ Thanks to @msftsecresponse for rapidly triaging and patching this vulnerability.
English
11
96
910
67.3K
Hank Chen retweetledi
Octoberfest7
Octoberfest7@Octoberfest73·
This is interesting. Ntdll has a whole bunch of 16-byte aligned (and thus CFG-compatible) jmps to function pointers stored in .mrdata (all resolving to User32 funcs). Most have zero references, jmp inst or the fp, and the fp's can be overwritten without triggering copy-on-write
Octoberfest7 tweet media
English
2
17
212
13.9K
Hank Chen retweetledi
TrendAI Zero Day Initiative
💡Striking! #Pwn2Own newcomer @hank0438 of InnoEdge Labs flash a light bulb on and off the show he exploited the Phillips Hue Bridge. He's off to the disclosure room to enlighten us on how he did it. #P2OIreland
English
0
1
13
5.6K
Hank Chen retweetledi
TrendAI Zero Day Initiative
✨Confirmed! Hank Chen (@hank0438) of InnoEdge Labs used an auth bypass and an OOB write to exploit the Phillips Hue Bridge. Their second round win nets them $20,000 and 4 Master of Pwn points. #Pwn2Own
TrendAI Zero Day Initiative tweet media
English
0
3
30
3.8K