Carlos Adriano — CEO
If my expertise aligns with what you’re looking for, let’s schedule a coffee meeting to explore potential opportunities. ☕️📈 Languages: 🇧🇷 Portuguese 🇺🇸 English Certifications: - CMPen; With over 6 years of experience, I work at the intersection of Software Engineering and Reverse Engineering, building high-performance systems while deconstructing proprietary software at its lowest level. This duality defines my career: I create more secure solutions because I understand how they break. My work today focuses on reverse engineering Linux software and Android/iOS applications, from high-level logic down to native libraries and ARM64 binaries. This often involves bypassing proprietary protections to understand business logic, helping clients either replicate or better protect their own software. It is essentially an R&D role: I reverse engineer a solution and then code it, working across Rust, C/C++, Python, Go, Java, and JavaScript. A core part of this work involves reconstructing custom protocols, proprietary TLS flows, and non-standard communication layers. This extends into cryptographic engineering: key derivation (HKDF), authenticated encryption (XChaCha20-Poly1305), and signature systems (Ed25519), enabling me to build MITM proxies, detection engines, and automation tools that decode proprietary traffic in real time. A growing area of my R&D is AI-driven reverse engineering. Static analysis alone is unreliable without runtime validation, so I build automated pipelines combining static analysis, device debugging, MITM interception, and Frida instrumentation, letting AI agents cross-check findings against real execution data. Chopper, an open-source MCP server I built in Rust, exposes 90 tools for Android and iOS that an AI agent can orchestrate end-to-end. On Android: inline hooking (Dobby, ShadowHook), LSPosed/Xposed, Play Integrity and anti-tampering bypass. On iOS: Mach-O/ARM64 analysis, sandbox/entitlement research, dyld shared cache extraction, jailbreak detection bypass, and private framework reversing with IDA Pro, Hopper, LLDB, Frida/ElleKit/Substrate. Beyond mobile: obfuscation layers, custom VMs, and anti-tampering across Windows, Linux, and ICS/OT. My background includes cyber defense at the Brazilian Army, critical infrastructure security at Petrobras, banking threat intelligence at Tempest Security, and offensive research at DefensePoint. Building systems with the mindset of someone who knows how they break, and analyzing threats with the knowledge of someone who designs what they target.
Stackforce AI infers this person is a Cybersecurity Expert specializing in Reverse Engineering and Software Security.
Location: São Paulo, Brazil
Experience: 5 yrs
Skills
- Reverse Engineering
- Software Engineering
- Software Security Engineering
- Cyber Threat Intelligence (cti)
- Cybersecurity
- Robotics
- Data Science
Career Highlights
- Over 6 years of experience in reverse engineering.
- Expert in building secure solutions through deep software analysis.
- Founder and CEO of ReverseLabs, leading R&D initiatives.
Work Experience
DefensePoint
Software Security Engineer | Reverse Engineer (R&D) (1 yr 11 mos)
Grupo Boticário
Cyber Security Specialist | Software Engineer | Reverse Engineer (CTI) (1 yr 2 mos)
ReverseLabs
Reverse Engineer | Software Engineer (3 yrs 2 mos)
Tempest Security Intelligence
CyberSecurity Reasearcher - CTI (Reverse Engineer) (1 yr)
Petrobras
Malware Reverse Engineer - CSIRT | CTI - PETROBRAS SA (11 mos)
Exército Brasileiro
Cyber Security Analyst | Reverse Engineer (1 yr 11 mos)
IFTO - INSTITUTO FEDERAL DE EDUCAÇÃO, CIÊNCIA E TECNOLOGIA DO TOCANTINS
Researcher | GENESIS Robotics Team (2 yrs 1 mo)
Researcher | G-REDES (3 yrs 1 mo)
Education
System Analysis and Development at Centro Universitário Internacional UNINTER
Technician at IFTO - INSTITUTO FEDERAL DE EDUCAÇÃO, CIÊNCIA E TECNOLOGIA DO TOCANTINS