C

Carlos Adriano

CEO

São Paulo, Brazil5 yrs experience
Highly Stable

Key Highlights

  • Over 6 years of experience in reverse engineering.
  • Expert in building secure solutions through deep software analysis.
  • Founder and CEO of ReverseLabs, leading R&D initiatives.
Stackforce AI infers this person is a Cybersecurity Expert specializing in Reverse Engineering and Software Security.

Contact

Skills

Core Skills

Reverse EngineeringSoftware EngineeringSoftware Security EngineeringCyber Threat Intelligence (cti)CybersecurityRoboticsData Science

Other Skills

MagiskLSPosedOLLVMUnidbgDobbyFridaUnicornIDA ProZygiskFARTRustC++PythonJavaJavaScript

About

If my expertise aligns with what you’re looking for, let’s schedule a coffee meeting to explore potential opportunities. ☕️📈 Languages: 🇧🇷 Portuguese 🇺🇸 English Certifications: - CMPen; With over 6 years of experience, I work at the intersection of Software Engineering and Reverse Engineering, building high-performance systems while deconstructing proprietary software at its lowest level. This duality defines my career: I create more secure solutions because I understand how they break. My work today focuses on reverse engineering Linux software and Android/iOS applications, from high-level logic down to native libraries and ARM64 binaries. This often involves bypassing proprietary protections to understand business logic, helping clients either replicate or better protect their own software. It is essentially an R&D role: I reverse engineer a solution and then code it, working across Rust, C/C++, Python, Go, Java, and JavaScript. A core part of this work involves reconstructing custom protocols, proprietary TLS flows, and non-standard communication layers. This extends into cryptographic engineering: key derivation (HKDF), authenticated encryption (XChaCha20-Poly1305), and signature systems (Ed25519), enabling me to build MITM proxies, detection engines, and automation tools that decode proprietary traffic in real time. A growing area of my R&D is AI-driven reverse engineering. Static analysis alone is unreliable without runtime validation, so I build automated pipelines combining static analysis, device debugging, MITM interception, and Frida instrumentation, letting AI agents cross-check findings against real execution data. Chopper, an open-source MCP server I built in Rust, exposes 90 tools for Android and iOS that an AI agent can orchestrate end-to-end. On Android: inline hooking (Dobby, ShadowHook), LSPosed/Xposed, Play Integrity and anti-tampering bypass. On iOS: Mach-O/ARM64 analysis, sandbox/entitlement research, dyld shared cache extraction, jailbreak detection bypass, and private framework reversing with IDA Pro, Hopper, LLDB, Frida/ElleKit/Substrate. Beyond mobile: obfuscation layers, custom VMs, and anti-tampering across Windows, Linux, and ICS/OT. My background includes cyber defense at the Brazilian Army, critical infrastructure security at Petrobras, banking threat intelligence at Tempest Security, and offensive research at DefensePoint. Building systems with the mindset of someone who knows how they break, and analyzing threats with the knowledge of someone who designs what they target.

Experience

Defensepoint

Software Security Engineer | Reverse Engineer (R&D)

Oct 2023Sep 2025 · 1 yr 11 mos · Lisboa, Portugal

  • Situation & Task
  • DefensePoint engaged me in dual roles:
  • Research: advance static analysis (SAST) detection for memory-safety and logic vulnerabilities in low-level languages.
  • Offensive Security: deliver scalable pentesting, reverse engineering, and malware development projects to raise coverage across web and mobile applications.
  • Action
  • SAST Research:
  • Conducted in-depth analysis of vulnerability patterns in C/C++/Rust/Go/Java.
  • Designed detection specifications, taint/source-sink models, and path-sensitive rules for memory safety, integer overflow/underflow, UAF, unsafe FFI, race conditions, and deserialization flaws.
  • Built proof-of-concept parsers, validation frameworks (precision/recall), and test corpora integrated into CI/CD pipelines.
  • Delivered production-ready rule packs that enhanced detection capabilities for a major SAST vendor.
  • Web/Mobile Pentest & Reverse:
  • Performed pentests and offensive security assessments for web and mobile apps, combining threat modeling, fuzzing (AFL, honggfuzz, cargo-fuzz), and RE techniques.
  • Result
  • ✅ Boosted SAST vendor capabilities by shipping rule packs that significantly improved coverage across C/C++/Rust/Go/Java ecosystems.
  • ✅ Cut mobile testing cycles time with automated retesting and protocol instrumentation.
  • ✅ Provided clients with higher-fidelity vulnerability coverage, enabling faster remediation and stronger resilience.
Python (Programming Language)Rust (Programming Language)Software Security EngineeringReverse EngineeringApplication SecurityLinux+6

Grupo boticário

Cyber Security Specialist | Software Engineer | Reverse Engineer (CTI)

Feb 2023Apr 2024 · 1 yr 2 mos · Brasil · Remote

  • Situation & Task
  • Grupo Boticário, a large retail enterprise, needed stronger cyber threat detection capabilities while migrating from legacy SIEM (QRadar) to SentinelOne XDR. The challenge was ensuring coverage continuity, reducing noise, and defending against ransomware campaigns targeting the retail sector.
  • Action
  • Designed and led an intel-driven detection program: CTI strategy, YARA/Sigma rule engineering, and Python automation to transform research into durable detections.
  • Built an automated Sigma → QRadar ingestion pipeline with normalization, ATT&CK/actor tagging, staged rollouts, and rollback guardrails.
  • Developed adversary emulation automation (Atomic Red Team + custom benign artifacts) to validate detections end-to-end and surface drift early.
  • Conducted reverse engineering of ransomware families (e.g., Akira), analyzing cryptographic implementations and mapping TTPs into Sigma/YARA + emulation artifacts.
  • Participate in the migration from QRadar → SentinelOne XDR: re-implemented detectors, parsers, hunts, and dashboards to accelerate analyst triage.
  • Partnered with Vulnerability Management (Qualys) to correlate CVEs with ransomware behaviors and prioritize remediation.
  • Result
  • ✅ Achieved 64% reduction in mapped attack surface by linking exposure to ransomware behaviors(TTPs/CVEs/Emulations).
  • ✅ Preserved full detection coverage during the SIEM → XDR migration.
  • ✅ Delivered higher-fidelity alerts with reduced noise, improved time-to-signal, and standardized coverage reports for leadership.
Python (Programming Language)FirmwareRust (Programming Language)Reverse EngineeringLinuxSigma+11

Reverselabs

Reverse Engineer | Software Engineer

Jan 2023Present · 3 yrs 2 mos · Ханчжоу · Remote

  • The famous company of one man hahahahaha
  • iam the founder and CEO of ReverseLabs, where I currently work in different challenges:
  • I operate in Research and Development across proprietary software, working with companies from Australia, Europe, the United States, and China. My contracts focus on understanding how proprietary systems work at a deep level, from intellectual property mechanisms and custom protocols to cryptographic flows and hardened security layers, primarily within mobile/firmware and Android/Linux ecosystems. This work feeds into two core areas:
  • ▸ Reverse Engineering
  • Deep analysis of mobile applications, native protections, custom virtual machines, obfuscation layers, and anti tampering mechanisms. I reverse engineer protected binaries to extract logic, understand cryptographic implementations, analyze proprietary protocols, and assist companies in improving their security posture. My daily work involves bridging Java and native layers (ART, JNI, native libraries, kernel interactions) using IDA, Frida, Unidbg, Angr, LLVM, Unicorn, QEMU, and custom tooling.
  • ▸ Software Engineering
  • I design and build internal frameworks, backend systems, and automation tooling in Rust, C++, Python, Java, and JavaScript. This includes distributed service architectures for large scale binary processing, async pipelines built on Tokio, and internal APIs using gRPC and Protocol Buffers. Frameworks handle automated deobfuscation of control flow flattening, mixed boolean arithmetic, and virtualization based protections, running across multiple workers with job scheduling, result aggregation, and persistent storage backed by PostgreSQL and Redis. Development follows TDD practices with structured test suites, integration tests against real infrastructure, and CI/CD pipelines for continuous validation. Code is modular, documented, and built for long term maintainability across projects and client requirements.
Reverse EngineeringMagiskLSPosedOLLVMUnidbgDobby+6

Tempest security intelligence

CyberSecurity Reasearcher - CTI (Reverse Engineer)

Jan 2022Jan 2023 · 1 yr

  • Situation & Task
  • Tempest needed to strengthen its cyber threat intelligence program for the LATAM banking threat landscape, where Windows and Android malware families were evolving rapidly to target regional payment systems and financial institutions. The challenge was to translate complex research into actionable detections and deliver operational intelligence to clients in the financial sector.
  • Action
  • Developed CTI strategy and authored advanced YARA and Sigma rules for real-time detection.
  • Conducted reverse engineering of LATAM malware families for Windows and Android, extracting TTPs, IOCs, and cryptographic implementations.
  • Built Python automations to extract IOCs/configs at scale, producing structured outputs for SIEM correlation and analyst triage.
  • Operated a honeymail-to-MISP pipeline, capturing multi-stage campaigns and publishing intelligence directly consumable by security teams in the financial sector.
  • Created a mobile malware testing platform with Genymotion + Corellium, instrumented with Frida hooks for SSL pinning bypass, dynamic key extraction, and anti-debug/root evasion.
  • Result
  • ✅ Delivered faster investigations and hunts by automating IOC/TTP extraction.
  • ✅ Ensured consistent detection coverage across families, enabling analysts to deploy detections with minimal tuning.
  • ✅ Empowered financial-sector organizations in LATAM with operational intelligence, strengthening defenses against evolving malware campaigns.
Python (Programming Language)Rust (Programming Language)Reverse EngineeringLinuxWindowsAndroid+7

Petrobras

Malware Reverse Engineer - CSIRT | CTI - PETROBRAS SA

Feb 2021Jan 2022 · 11 mos · Rio de Janeiro, Brasil

  • Situation & Task
  • Petrobras, a major oil & gas multinational, required stronger malware detection and response capabilities across its enterprise and industrial (OT) environments. The challenge was to support CSIRT operations, accelerate investigations, and build durable detections against advanced threats targeting Windows, Android, and IoT systems.
  • Action
  • Developed Python automations to streamline threat analysis, enrich alerts, and generate data-driven insights for defenders.
  • Conducted malicious file analysis and reverse engineering across Windows, Android, and IoT malware families, mapping behaviors into actionable detection rules.
  • Performed targeted threat hunting in enterprise and industrial environments, correlating telemetry with threat intelligence to identify ongoing compromises.
  • Created and maintained a knowledge base to support SOC/CSIRT workflows, ensuring lessons learned were codified into new detection content and playbooks.
  • Partnered with the SOC to triage and respond to malware-related alerts across onshore, offshore, and automation systems.
  • Result
  • ✅ Delivered faster triage and investigations, reducing analyst workload and improving detection quality.
  • ✅ Strengthened Petrobras’ cyber resilience by turning reverse engineering insights into deployable SIEM detections and playbooks.
  • ✅ Established a repeatable workflow for CSIRT that improved coverage of both IT and OT threats.
Python (Programming Language)FirmwareRust (Programming Language)Reverse EngineeringLinuxWindows+9

Exército brasileiro

Cyber Security Analyst | Reverse Engineer

Mar 2019Feb 2021 · 1 yr 11 mos · Palmas, Tocantins, Brasil

  • In the Armed Forces, I worked in the following areas:
  • Incident Response;
  • Malware Analysis;
  • SOC (Security Operations Center) Development;
  • Network Security;
  • Development of Playbooks and Runbooks;
  • Advanced CSIRT Activities.
  • I completed professionalization courses in CyberSecurity, focusing on these areas, delivered both by the institution itself and by CISCO. These courses were designed to train and qualify temporary military personnel for specialized tasks.
  • Additionally, during the CISCO Brazil 2020 CyberEducation program, I achieved a top-100 national ranking, competing with both military and civilian participants.
Python (Programming Language)FirmwareRust (Programming Language)Reverse EngineeringLinuxWindows+6

Ifto - instituto federal de educação, ciência e tecnologia do tocantins

2 roles

Researcher | GENESIS Robotics Team

Jan 2017Feb 2019 · 2 yrs 1 mo · Palmas, Tocantins

  • In the GENESIS Robotic Team, I worked in the following areas:
  • Python;
  • JavaScript;
  • Data Science;
  • LLMs;
  • Computer Vision;
  • C/C++;
  • Assembly x86;
  • embedded systems;
  • Electronics.
  • In this team, I contributed specifically to the development of a robotic system designed to navigate areas impacted by natural disasters. I developed software integrated into the robot that utilized advanced computer vision to identify objects, people, pathways, and animals. Additionally, the system incorporated various sensors, including gas, motion, and tactile sensors, among others, to enable the robot to effectively perform its tasks.
Python (Programming Language)FirmwareRust (Programming Language)Reverse EngineeringLinuxWindows+6

Researcher | G-REDES

Jan 2016Feb 2019 · 3 yrs 1 mo · Palmas, Tocantins

  • On G-REDES research group, i worked with:
  • Python;
  • Data Science;
  • LLMs;
  • Computer Vision;
  • C/C++;
  • Assembly x86;
  • embedded systems;
  • Eletronic.
  • I have been involved in projects focused on developing advanced image recognition software for autonomous drones, delivering solutions across the agriculture, surveillance, and search and rescue sectors.
Python (Programming Language)FirmwareLinuxMobile SecurityARM AssemblyRobotics+1

Education

Centro Universitário Internacional UNINTER

System Analysis and Development

Mar 2020Dec 2023

IFTO - INSTITUTO FEDERAL DE EDUCAÇÃO, CIÊNCIA E TECNOLOGIA DO TOCANTINS

Technician

Jan 2016Jan 2019

Stackforce found 100+ more professionals with Reverse Engineering & Software Engineering

Explore similar profiles based on matching skills and experience