I'M MILTON
Security Researcher

Offensive security specialist with deep expertise in penetration testing, evasion techniques, malware development, and reverse engineering.

Hackers Behind

the Code

Hackers Behind

the Code

Exploring the minds shaping digital security from the inside out.

Access the podcast now!

CERTIFICATIONS

CERTIFICATIONS

ARTICLES

HTML Smuggling and EDR Bypass

This project demonstrates how to use HTML Smuggling as an evasion technique to bypass Antivirus (AV) and Endpoint Detection and Response (EDR) solutions. Originally presented at Leiria Tech Talks, this walkthrough covers payload generation, shellcode transformation, in-memory execution, and delivery via a web browser using HTML Smuggling techniques.

HTML Smuggling and
EDR Bypass

This project demonstrates how to use HTML Smuggling as an evasion technique to bypass Antivirus (AV) and Endpoint Detection and Response (EDR) solutions. Originally presented at Leiria Tech Talks, this walkthrough covers payload generation, shellcode transformation, in-memory execution, and delivery via a web browser using HTML Smuggling techniques.

HTML Smuggling and
EDR Bypass

This project demonstrates how to use HTML Smuggling as an evasion technique to bypass Antivirus (AV) and Endpoint Detection and Response (EDR) solutions. Originally presented at Leiria Tech Talks, this walkthrough covers payload generation, shellcode transformation, in-memory execution, and delivery via a web browser using HTML Smuggling techniques.

Adaptix C2 Framework

Adaptix C2 is a modular and stealth-oriented Command and Control framework tailored for red team operations. It supports advanced evasion techniques, customizable listeners, and an extensible architecture through operational modules called extenders. This article explores its setup, payload delivery, and practical offensive use cases.

Premium UX Template for Framer

Adaptix C2 Framework

Adaptix C2 is a modular and stealth-oriented Command and Control framework tailored for red team operations. It supports advanced evasion techniques, customizable listeners, and an extensible architecture through operational modules called extenders. This article explores its setup, payload delivery, and practical offensive use cases.

Premium UX Template for Framer

Adaptix C2 Framework

Adaptix C2 is a modular and stealth-oriented Command and Control framework tailored for red team operations. It supports advanced evasion techniques, customizable listeners, and an extensible architecture through operational modules called extenders. This article explores its setup, payload delivery, and practical offensive use cases.

Premium UX Template for Framer

ABOUT ME

I lead advanced red team operations focused on bypassing modern defensive technologies such as EDRs, antivirus engines, and sandbox environments. My work involves developing custom payloads, in-memory loaders, and obfuscation techniques to simulate real-world threats and support continuous security improvement.

Key areas of expertise:

• Penetration testing (Infrastructure, Web, APIs, Mobile, Wireless)

• Penetration testing (Infrastructure, Web, APIs, Mobile, Wireless)

• Penetration testing (Infrastructure, Web, APIs, Mobile, Wireless)

• Penetration testing (Infrastructure, Web, APIs, Mobile, Wireless)

• Penetration testing (Infrastructure, Web, APIs, Mobile, Wireless)

• Malware analysis and binary reversing using IDA Pro, Ghidra, and custom tools

• Malware analysis and binary reversing using IDA Pro, Ghidra, and custom tools

• Malware analysis and binary reversing using IDA Pro, Ghidra, and custom tools

• Malware analysis and binary reversing using IDA Pro, Ghidra, and custom tools

• Malware analysis and binary reversing using IDA Pro, Ghidra, and custom tools

• Building evasive malware and shellcode execution frameworks

• Building evasive malware and shellcode execution frameworks

• Building evasive malware and shellcode execution frameworks

• Building evasive malware and shellcode execution frameworks

• Building evasive malware and shellcode execution frameworks

• Adversary emulation and threat simulation

• Adversary emulation and threat simulation

• Adversary emulation and threat simulation

• Adversary emulation and threat simulation

• Adversary emulation and threat simulation

• Offensive tooling and red team infrastructure

• Offensive tooling and red team infrastructure

• Offensive tooling and red team infrastructure

• Offensive tooling and red team infrastructure

• Offensive tooling and red team infrastructure

• Bypassing detection controls (AV/EDR/XDR)

• Bypassing detection controls (AV/EDR/XDR)

• Bypassing detection controls (AV/EDR/XDR)

• Bypassing detection controls (AV/EDR/XDR)

• Bypassing detection controls (AV/EDR/XDR)

In parallel with hands-on work, I actively contribute to the OWASP community and participate in security research projects focused on offensive techniques and threat modeling.

I also serve as a postgraduate-level cybersecurity instructor, sharing knowledge in areas like malware development, exploit analysis, and offensive security operations.
My mission is to push the boundaries of offensive security to help organizations strengthen their defenses,understand attacker tradecraft, and build resilient environments.

I lead advanced red team operations focused on bypassing modern defensive technologies such as EDRs, antivirus engines, and sandbox environments. My work involves developing custom payloads, in-memory loaders, and obfuscation techniques to simulate real-world threats and support continuous security improvement.

Key areas of expertise:

• Penetration testing (Infrastructure, Web, APIs, Mobile, Wireless)

• Penetration testing (Infrastructure, Web, APIs, Mobile, Wireless)

• Penetration testing (Infrastructure, Web, APIs, Mobile, Wireless)

• Malware analysis and binaryreversing using IDA Pro, Ghidra, and custom tools

• Malware analysis and binaryreversing using IDA Pro, Ghidra, and custom tools

• Malware analysis and binaryreversing using IDA Pro, Ghidra, and custom tools

• Building evasive malware and shellcode execution frameworks

• Building evasive malware and shellcode execution frameworks

• Building evasive malware and shellcode execution frameworks

• Adversary emulation and threat simulation

• Adversary emulation and threat simulation

• Adversary emulation and threat simulation

• Offensive tooling and red team infrastructure

• Offensive tooling and red team infrastructure

• Offensive tooling and red team infrastructure

• Bypassing detection controls (AV/EDR/XDR)

• Bypassing detection controls (AV/EDR/XDR)

• Bypassing detection controls (AV/EDR/XDR)

In parallel with hands-on work, I actively contribute to the OWASP community and participate in security research projects focused on offensive techniques and threat modeling.

I also serve as a postgraduate-level cybersecurity instructor, sharing knowledge in areas like malware development, exploit analysis, and offensive security operations.
My mission is to push the boundaries of offensive security to help organizations strengthen their defenses,understand attacker tradecraft, and build resilient environments.

I lead advanced red team operations focused on bypassing modern defensive technologies such as EDRs, antivirus engines, and sandbox environments. My work involves developing custom payloads, in-memory loaders, and obfuscation techniques to simulate real-world threats and support continuous security improvement.


In parallel with hands-on work, I actively contribute to the OWASP community and participate in security research projects focused on offensive techniques and threat modeling.


I also serve as a postgraduate-level cybersecurity instructor, sharing knowledge in areas like malware development, exploit analysis, and offensive security operations.

My mission is to push the boundaries of offensive security to help organizations strengthen their defenses,understand attacker tradecraft, and build resilient environments.

SKILLS

Offensive Reverse Engineering

Advanced Post-Exploitation

Custom Payloads & Shellcode

Buffer Overflow Exploits

Protocol & Misconfig Exploits

Tunneling & Covert Channels

Exploitation Validation

Web App Exploitation (OWASP)

Client-Side Payloads

Misconfig Discovery (Cloud/On-Prem)

Audit Alignment (ISO/NIST/OWASP)

Red & Purple Team Support

Pen Testing Methodologies

Threat Surface Mapping

Windows Attack Techniques

Exploit Chain Research

Malware & Fingerprint Reduction

EDR & NDR Evasion

AV Evasion (Obfuscation, HTML-S)

Anti-Forensics & Traffic Shaping

Active Directory Exploits

Credential Attacks & Token Abuse

Custom Red Team Tooling

EXPERIENCE

Founder & Host

r19.io

Lisbon - May 2025 - Present

OWASP Member

OWASP Foundation

Lisbon - Jun 2024 - Present

Principal Cybersecurity Auditor

Visionware

Lisbon - Set 2022 - Present

Official Instructor

EC-Council

Brazil - Ago 2021 - Present

EXPERIENCE

Founder & Host

r19.io

Lisbon - May 2025 - Present

OWASP Member

OWASP Foundation

Lisbon - Jun 2024 - Present

Principal Cybersecurity Auditor

Principal Cybersecurity

Auditor

Visionware

Lisbon - Set 2022 - Present

Official Instructor

EC-Council

Brazil - Ago 2021 - Present

Founder & Security Researcher

Founder & Security

Researcher

Secure Tecnologia

Brazil - Apr 2016 - Present

It's a long story... Professionally I worked as a systems developer, and despite being relatively young, I've already been through a bit of everything in technology and security, huuuu, believe it or not. It all started when I was just 12 years old.

All rights reserved, ©2025

Design By Eitch Studio