Alexandre Borges

DevOps Engineer

Brazil9 yrs 3 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Expert in Windows vulnerability research and exploit development.
  • Contributed to the cyber community through educational articles.
  • Experienced instructor in data protection and security courses.
Stackforce AI infers this person is a Cybersecurity Expert with a focus on Vulnerability Research and Exploit Development.

Contact

Skills

Core Skills

Vulnerability ResearchExploit DevelopmentNetwork SecuritySolaris Administration

Other Skills

Windows InternalsFuzzingC/C++PythonIDA PythonAssemblySecurityx86 AssemblyPerformance TuningmacOS/iOS Vulnerability ResearcherReverse EngineeringMalware AnalysisThreat HuntingHypervisor Vulnerability ResearchBrowser Vulnerability Research

About

Description: Over time, I have been performing the following activities: [+] Exploit Development on Windows. [+] Vulnerability Research on Windows, iOS and Browsers. [+] Fuzzing operating system and applications. [+] Programming: C/C++, Python and IDA Python. [+] Code Review/Secure Code auditing. [+] Malware Analysis (past) [+] Threat Hunting (past) I've been contributing to the global cyber community by writing articles to help professionals to improve their skills. A list of my last articles follows below: 01. https://exploitreversing.com/2026/02/11/exploiting-reversing-er-series-article-06/ 02. https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/ 03. https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/ 04. https://exploitreversing.com/2025/01/22/exploiting-reversing-er-series-article-03/ 05. https://exploitreversing.com/2024/01/03/exploiting-reversing-er-series-article-02/ 06. https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/

Experience

Blackstorm security

Vulnerability Researcher and Exploit Developer

Nov 2017Present · 8 yrs 4 mos · São Paulo, Brazil · Remote

  • I have been working as vulnerability researcher and exploit developer:
  • [+] Windows vulnerability research.
  • [+] Windows exploit development.
  • [+] iOS/macOS and Chrome vulnerability research.
  • [+] Fuzzing operating systems and applications.
  • [+] Programming: C/C++, Python, IDA Python and Assembly (x64/x86/ARM)
  • [+] Code Review/Secure Code auditing.
  • [+] Malware Analysis (past)
  • [+] Threat Hunting (past).
  • I've been contributing to the global cyber community by writing articles to help professionals to improve their skills. A list of my last articles follows below:
  • 01. https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/
  • 02. https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/
  • 03. https://exploitreversing.com/2025/01/22/exploiting-reversing-er-series-article-03/
  • 04. https://exploitreversing.com/2024/01/03/exploiting-reversing-er-series-article-02/
  • 05. https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/
Vulnerability ResearchExploit DevelopmentWindows InternalsFuzzingC/C++Python+2

Symantec

Course Instructor

Aug 2009Jul 2015 · 5 yrs 11 mos · São Paulo, Brazil · On-site

  • I enabled main Brazilian companies making better data protection projects, understanding and using NetBackup product with maximum efficiency as well implement critical high availability services through Veritas Cluster.
  • Job Description: Responsible for teaching Symantec courses:
  • [+] NetBackup
  • [+] Veritas Cluster
  • [+] Storage Foundation
  • [+] SEP
Network SecuritySecurity

Sun microsystems

Course Instructor

Jan 2001Jun 2010 · 9 yrs 5 mos · São Paulo Area, Brazil · On-site

  • Responsible for teaching all Oracle/Sun courses (Solaris, Cluster and Security). In addition, I was responsible for all hardware (high-end and mid-server) courses.
  • My experience and daily work at Sun Microsystems were composed by the following skills:
  • [+] Solaris Administration
  • [+] Performance and Tunning
  • [+] Solaris Internals
  • [+] Solaris Security
  • [+] High Availability (Cluster)
  • [+] High-end Servers
  • [+] Storage Administration
  • [+] SPARC Assembly
  • [+] Reversing Engineering and Crash Dump Analysis.
x86 AssemblyPerformance TuningSolaris Administration

C&m software

Security Analyst (Pentester)

Feb 2000Jan 2001 · 11 mos · São Paulo Area, Brazil

  • I worked as pentester. My role was verifying and exploiting vulnerabilities (blackbox model) on customers by using all techniques and possible methods to hack Windows and Linux systems.

Education

Pontifícia Universidade Católica de São Paulo

Specialist — IT

Jan 2007Jan 2009

USP - Universidade de São Paulo

Jan 1994Jan 2008

Stackforce found 100+ more professionals with Vulnerability Research & Exploit Development

Explore similar profiles based on matching skills and experience