Offensive Security Researcher
Penetration Tester
Red Team Operator
Hacking n' Roll
I have amassed seven years of experience in offensive security and hold esteemed certifications such as the GIAC Mobile Device Security Analyst and Offensive Security Web Expert. I am passionate about conducting vulnerability research and have discovered 16 CVEs in various vendors such as PRTG, Nagios, 3CX, Centreon, and others. Additionally, I have contributed to developing the ReconFTW web interface and am the creator of the Exploit Jewish Napalm.
Vulnerability research is the process of discovering and analyzing security vulnerabilities in software, networks, or systems, to identify potential weaknesses that could be exploited.
Penetration testing is a simulated cyberattack aimed at identifying security weaknesses and vulnerabilities in a system or network.
Lectures on offensive security typically cover ethical hacking, penetration testing, vulnerability research, and exploitation techniques to help the community
Full-stack development involves building both the front-end and back-end components of an application, allowing developers to work on all layers of the architecture.
Having dedicated my efforts to enhance the technical quality of the pentest team, I have assisted management in implementing the Individual Development Plan (IDP). As the founder of the company's research and development department, I have been contributing to vulnerability research, enhancements to community tools, delivering lectures, creating exploits, and various other initiatives
Dedicated to all types of intrusion testing and also all part of engineering, checking and solving problems found in mobile environments, such as: analyzing implementations of SSL Pinning, Hook Detection, Root/Jailbreak Detection, Frida Detection, Tamper Protection, etc.
Dedicated to research and development in offensive security context. Providing not only to Stone Co but also the entire Arpex holding with companies like Pagar.me, Mundipagg, Equals, Cappta and Elavon. Member of STOlabs, a research group responsible for the discovery of more than 50 vulnerabilities found, and reported on solutions adopted worldwide.
Dedicated to all types of intrusion testing and also all part of engineering, checking and solving problems found in mobile environments, such as: analyzing implementations of SSL Pinning, Hook Detection, Root/Jailbreak Detection, Frida Detection, Tamper Protection, etc.
Dedicated to penetration tests and researchers. Providing not only to Stone Co but also the entire Arpex holding with companies like Pagar.me, Mundipagg, Equals, Cappta and Elavon. Member of STOlabs, a research group responsible for the discovery of more than 50 vulnerabilities found, and reported on solutions adopted worldwide.
Dedicated to operations regarding web, mobile, internal infrastructure, wireless network, physical intrusion, adversary simulation, etc.
Dedicated to intrusion testing and also all part of engineering, checking and solving problems found in mobile environments, such as: analyzing implementations of SSL Pinning, Hook Detection, Root/Jailbreak Detection, Frida Detection, Tamper Protection, etc.