Skip to content
View regaan's full-sized avatar

Block or report regaan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
regaan/README.md

~/regaan_

Security Researcher focused on AI/LLM Red Teaming and Protocol-Level Offensive Systems.

I design and build operator-grade tooling for adversarial testing, stateful exploitation workflows, and large-scale security evaluation — with an emphasis on reproducibility, evidence integrity, and real-world usage.

Author of Basilisk (AI Red Teaming Framework) and WSHawk v4 (project-based WebSocket & Web Pentest platform).

Based in Chennai, India.


Focus Areas

  • AI/LLM Security Adversarial prompt evolution, guardrail evaluation, and cross-model behavioral analysis.

  • Stateful Offensive Testing Replay systems, AuthZ diffing, race-condition testing, and identity-driven attack workflows.

  • Protocol & Realtime Security WebSocket interception, mutation, and protocol-level fuzzing.

  • Offensive Tooling Systems Building end-to-end platforms for discovery → exploitation → evidence generation.


Flagship Systems

Basilisk — Evolutionary AI Red Teaming Framework

Framework for systematic security evaluation of LLMs using evolutionary techniques.

Instead of static prompts, Basilisk evolves adversarial inputs across generations to uncover non-obvious failure modes.

Core Concepts

  • Genetic prompt evolution (mutation + crossover)
  • Multi-model differential testing
  • Structured attack modules (injection, leakage, tool misuse)
  • Automated discovery of behavioral inconsistencies

Goal Move from static prompt testing → adaptive adversarial systems.

📄 Research: https://doi.org/10.5281/zenodo.18909538


WSHawk v4 — WebSocket & Web Pentest Platform

WSHawk is a project-based offensive security platform designed for real-world assessments — not just scanning.

It combines WebSocket testing, HTTP pentesting, replay systems, and evidence tracking into a single operator workflow.

Key Capabilities

  • Project-Based Workflow Stores identities, traffic, findings, notes, and attack results in a single environment.

  • WebSocket Interception & Manipulation Frame-level interception, editing, replay, and live protocol testing.

  • Replay & Stateful Attack System

    • Request replay
    • AuthZ differential testing
    • Race condition testing
  • Identity-Aware Testing Capture and reuse authenticated sessions across workflows.

  • Payload Mutation & Fuzzing High-volume payload execution with mutation strategies.

  • Integrated Web Pentest Suite Discovery, HTTP replay, attack workflows, and analysis tools.

  • Evidence Vault Structured evidence tracking with exportable bundles (JSON, HTML, Markdown) including integrity metadata.

What Makes It Different

WSHawk is not a scanner.

It is an operator environment designed to:

  • move from discovery → exploitation → validation
  • preserve reproducibility
  • generate defensible evidence

Selected Systems & Experiments

ProtoCrash — Protocol Fuzzer

Coverage-guided mutation fuzzer for network protocol implementations, designed for high-throughput distributed environments.


PoCSmith — Exploit Research Assistant

System for assisting proof-of-concept generation using vulnerability patterns and exploit structures.


RedLang — Security Research Language

LLVM-based statically typed language for exploit development and low-level experimentation.


Keikaku — Interpreted Runtime

Custom interpreted language with async execution and deterministic control flow.


Technical Stack

Languages
Go · C · C++ · Python · TypeScript

Core Areas
Fuzzing · Web Security · WebSocket Protocols · LLM Red Teaming

Systems
Linux Internals · TCP/IP · LLVM · Bytecode VMs

Infrastructure
Docker · Redis · PostgreSQL · GitHub Actions

AI/ML
Adversarial ML · Prompt Evolution · Model Evaluation


Work Approach

  • Build tools that reflect real operator workflows
  • Prioritize reproducibility over one-off findings
  • Treat evidence as a first-class output
  • Focus on stateful systems, not just stateless scanning

Achievements

  • Published Researcher — Basilisk (Zenodo, 2026)
  • Certified Ethical Hacker (CEH)
  • Speaker & Workshop Instructor (Offensive Security & Engineering)

Connect


Note

All research and tooling are developed and tested in authorized environments only.

Pinned Loading

  1. graphql-scanner graphql-scanner Public

    Advanced GraphQL vulnerability scanner with async support, 100+ attack payloads, field fuzzing, and Burp Suite integration.

    Python 1

  2. sqlmap-tamper-collection sqlmap-tamper-collection Public

    Modern WAF bypass tamper scripts for SQLMap targeting Cloudflare, AWS WAF, and Azure WAF using 2025 evasion techniques.

    Python 7 1

  3. wshawk wshawk Public

    Open source toolkit for WebSocket security testing, web application penetration testing, and stateful attack validation. It combines a CLI scanner, web dashboard, Electron desktop app, browser comp…

    Python 6 1

  4. PoCSmith PoCSmith Public

    PoCSmith is an AI model fine-tuned on exploit code and CVE data to assist security researchers in generating proof-of-concept exploits and shellcode for defensive purposes

    Python 1

  5. ProtoCrash ProtoCrash Public

    ProtoCrash is a smart mutation-based fuzzer designed to find crashes and vulnerabilities in network protocol implementations. Built with intelligent feedback-driven fuzzing techniques, it targets c…

    Python 1

  6. basilisk basilisk Public

    Basilisk — Open-source AI red teaming framework with genetic prompt evolution. Automated LLM security testing for GPT-4, Claude, Grok, Gemini. OWASP LLM Top 10 coverage. 32 attack modules.

    Python 11