Skip to content
View regaan's full-sized avatar

Block or report regaan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
regaan/README.md

~/regaan_

Security Researcher focused on AI/LLM systems, protocol-level testing, and stateful offensive workflows.

I design and build offensive tooling used for adversarial evaluation, exploit development, and reproducible security research. My work focuses on breaking complex, stateful systems where traditional scanning fails.

Based in Chennai, India.


Focus Areas

AI/LLM Security
Adversarial prompt generation, guardrail bypass testing, and cross-model behavior analysis with measurable outcomes.

Stateful Offensive Testing
Replay systems, authorization testing, race condition discovery, and identity-driven attack workflows.

Protocol and Realtime Security
WebSocket interception, protocol manipulation, and structured fuzzing of realtime systems.

Offensive Tooling
End-to-end systems for discovery, exploitation, and evidence generation designed for actual operator workflows.


Flagship Systems

Basilisk - Evolutionary AI Red Teaming Framework

Basilisk is a framework for adversarial testing of LLMs using evolutionary techniques.

It generates and evolves attack prompts across iterations to uncover failure modes that static testing does not reach.

Key capabilities:

  • Prompt mutation and crossover strategies
  • Differential testing across multiple models
  • Structured attack modules for injection, leakage, and tool misuse
  • Automated discovery of inconsistent and unsafe behaviors

Outcome: Finds non-obvious jailbreak paths and behavioral gaps across models under realistic conditions.

Research: https://doi.org/10.5281/zenodo.18909538


WSHawk v4 - WebSocket and Web Pentest Platform

WSHawk is a project-based offensive platform built for real assessments, not one-off testing.

It allows testers to move from traffic capture to exploitation and evidence generation inside a single workflow.

Key capabilities:

  • Centralized project environment for identities, traffic, and findings
  • WebSocket frame interception, editing, and replay
  • Stateful replay system for authorization testing and race conditions
  • Identity-aware testing with reusable authenticated sessions
  • Payload mutation and high-volume execution
  • Integrated HTTP testing and attack workflows
  • Evidence vault with structured export and integrity tracking

Why it matters: Removes fragmented tooling and enables repeatable, stateful attack workflows with defensible outputs.


Selected Systems

ProtoCrash
Coverage-guided protocol fuzzer designed for high-throughput distributed environments.

PoCSmith
System for generating proof-of-concept exploits based on vulnerability patterns.

RedLang
Statically typed language built on LLVM for exploit development and low-level experimentation.

Keikaku
Custom interpreted runtime with async execution and deterministic control flow.


Technical Stack

Languages
Go, C, C++, Python, TypeScript

Core Areas
Fuzzing, Web Security, WebSocket Protocols, LLM Red Teaming

Systems
Linux Internals, TCP/IP, LLVM, Bytecode Virtual Machines

Infrastructure
Docker, Redis, PostgreSQL, GitHub Actions

AI and ML
Adversarial machine learning, prompt evolution, model evaluation


Work Approach

Build systems that reflect real offensive workflows
Prioritize reproducibility over one-off findings
Treat evidence as a core output
Focus on stateful systems and complex attack surfaces


Achievements

Published Researcher
Basilisk, Zenodo, 2026

Certified Ethical Hacker

Speaker and Workshop Instructor in offensive security and engineering


Connect

Website
https://rothackers.com

GitHub
https://github.com/regaan

Twitter
https://x.com/regaan_sec

LinkedIn
https://linkedin.com/in/regaan


Note

All work is conducted in authorized environments only.

Pinned Loading

  1. graphql-scanner graphql-scanner Public

    Advanced GraphQL vulnerability scanner with async support, 100+ attack payloads, field fuzzing, and Burp Suite integration.

    Python 1

  2. sqlmap-tamper-collection sqlmap-tamper-collection Public

    Modern WAF bypass tamper scripts for SQLMap targeting Cloudflare, AWS WAF, and Azure WAF using 2025 evasion techniques.

    Python 7 1

  3. wshawk wshawk Public

    Open source toolkit for WebSocket security testing, web application penetration testing, and stateful attack validation. It combines a CLI scanner, web dashboard, Electron desktop app, browser comp…

    Python 6 1

  4. PoCSmith PoCSmith Public

    PoCSmith is an AI model fine-tuned on exploit code and CVE data to assist security researchers in generating proof-of-concept exploits and shellcode for defensive purposes

    Python 1

  5. ProtoCrash ProtoCrash Public

    ProtoCrash is a smart mutation-based fuzzer designed to find crashes and vulnerabilities in network protocol implementations. Built with intelligent feedback-driven fuzzing techniques, it targets c…

    Python 1

  6. basilisk basilisk Public

    Basilisk — Open-source AI red teaming framework with genetic prompt evolution. Automated LLM security testing for GPT-4, Claude, Grok, Gemini. OWASP LLM Top 10 coverage. 32 attack modules.

    Python 12