Security researcher • SANS instructor • consultant

Jean-Francois Maes

Red team operator, SANS instructor, and offensive security toolmaker. I build things that break things, then teach others how.

Pentesting Red team ops vCISO Adversary emulation SANS SEC565 SANS SEC699
Jean-Francois Maes

Teaching

SEC565 & SEC699 Red Team Ops & AI for Security

Open source

1,200+ GitHub stars across public tools

Consulting

Offensive Guardian Pentesting, red team, vCISO advisory

Product

Helix Labs Hermes, Context Me, Negotiator AI

Offensive Guardian

Security services

View all services →

Helix Labs

Products

helix-labs.app ↗

Hermes

AI-powered communication and workflow automation for security operations.

Helix Labs

Context Me

Contextual intelligence platform that enriches security data with actionable context.

Helix Labs

Negotiator AI

AI-assisted negotiation workflows for incident response and threat scenarios.

Helix Labs
Coming soon

Fine-Tuning LLMs

A practical book on adapting large language models to specialized domains. Covering techniques, tooling, and real-world case studies.

Book

Featured

Selected work

Tools, talks, and research worth looking at first.

Courses SANS course

Author & instructor

SEC565: Red Team Operations and Adversary Emulation

SANS course on red team operations covering adversary emulation, C2, and end-to-end attack simulation.

SANS Institute
Courses SANS course

Author & instructor

SEC699: Advanced AI Security and Operations

SANS course on applying AI to security operations: LLM integration, AI-powered workflows, and practical AI security.

SANS Institute
Talks 2026 workshop

Workshop author

Vibe Hacking: MCP Empire Edition

SANS workshop on driving Empire C2 through an MCP server using natural-language workflows.

GitHub
Tools 570+ stars

Creator

LazySign

Fake code-signing for binaries using built-in Windows tooling. The most-starred tool in the collection.

GitHub
Tools 304 stars

Creator

SharpZipRunner

Encrypted-zip loader that executes position-independent shellcode from memory.

GitHub
Tools 131 stars

Creator

phisherman

Phishing and MFA-bypass training application, originally built for SEC565.

GitHub

Overview

By category

Now

Current focus

Helix Labs products

Building Hermes, Context Me, and Negotiator AI. AI-powered tools for security operations, contextual intelligence, and negotiation workflows.

Workshop material

Developing new SANS workshop content around AI-assisted offensive workflows, including MCP server integrations with Empire C2.

Red team education

Continuing to build practical training material around adversary emulation, operator tradecraft, and phishing simulation for SEC565 and SEC699.

Writing a book

Writing a book on fine-tuning LLMs: practical techniques for adapting large language models to specialized domains.

SANS Institute

Upcoming teaching

All sessions ↗