Thiago Mayllart — Co-Founder
• Ability to create Infrastructure Resources for Red Team engagements: automation and rotation of redirectors and C2 servers (Creator of Harvis); creation of covert channel profiles for post-exploitation tools (Creator of DNS Profile – Mythic). • Knowledge in evasion of signature-based protection mechanisms (AMSI), EDRs (syscall manipulation) and telemetry (ETW) through process injection and byte patching techniques. • Experience in the creation of different phishing contexts through company and employees reconnaissance, in order to capture credentials or establish an initial foothold in the target. • Ability to enumerate, move laterally, set persistence and exfiltrate confidential information through Active Directory exploitation, minimizing indicators of compromise during the engagement. • Knowledge in reconnaissance techniques for Penetration Testing: Brute-Force; Permutation of Subdomains; Virtual Host discovery; SSL certificate analysis, finding subdomains with search indexers (Dorking), static content analysis (Javascript, HTML, etc), reverse DNS lookup. • Knowledge in vulnerabilities and manual/automated exploitation in Web Applications: Password Spray, SQL Injection, Cross-Site Scripting, Template Injection, XXE Injection, Deserialization, CSRF, Command Injection, Code Injection, Cookie Manipulation and vulnerable Ciphers (CBC/EBC), etc. • Experience with automated tools for Vulnerability Assessments: Nessus, Acunetix, Qualys. • Ability to automate Tools and Procedures during Red Team engagements (Scripting). • Knowledge in Artificial Intelligence – Reinforcement Learning: Dynamic Programming, Monte Carlo, Temporal Difference, Tabular Methods, Eligibility Traces. • Programming Languages: Rust, C#, Python, C, Java, Powershell, Bash. • Public Projects: Harvis: C2/redirector automation tool; Mythic: Port Forward task and DNS Profile for Apollo Agent; DarkMelkor: loading .NET assemblies in disposable AppDomains and injected processes; NightVision: subdomain enumeration tool. Private Projects: custom loader against EDRs; syscall dynamic resolution without importing ntdll or D/Invoke stubs; custom injection techniques and ETW syscall patch for Apollo.
Stackforce AI infers this person is a Red Team expert in cybersecurity with strong automation and leadership skills.
Location: São Paulo, São Paulo, Brazil
Experience: 7 yrs 6 mos
Skills
- Red Team
- Penetration Testing
- Team Leadership
Career Highlights
- Expert in Red Team engagements and penetration testing.
- Proficient in automation and tool development for security.
- Strong leadership and mentoring experience in cybersecurity.
Work Experience
Kraken Digital Asset Exchange
Senior Red Team Engineer (1 yr 11 mos)
Red Team Engineer (2 yrs 4 mos)
Hakai Offensive Security
Co-Founder/Partner & Red Team Technical Lead (2 yrs 9 mos)
Stone
Senior Red Teamer (1 yr 10 mos)
EY
Senior Information Security Consultant/Pentester (11 mos)
Trainee Information Security Consultant/Pentester (5 mos)
XP Investimentos
Information Security Analyst (4 mos)
Education
Bachelor's degree at USP - Universidade de São Paulo
Bachelor's degree at University of Alberta