Skip to content
View regaan's full-sized avatar

Block or report regaan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
regaan/README.md

~/regaan_

Independent Security Researcher · Offensive Security Engineer · Tool Builder
ROT Independent Security Research Lab · Chennai, India

ORCID DOI Figshare OSF Website Portfolio X Mastodon Medium


Research Interests

  • LLM Security & AI Red Teaming — adversarial prompt evolution, guardrail bypass, differential testing across LLM providers
  • Protocol Fuzzing — coverage-guided and mutation-based fuzzing of network protocol implementations
  • Offensive Security Automation — high-performance exploit research infrastructure, adversary simulation systems
  • Language Engineering — compiler design, bytecode VMs, security-oriented programming languages
  • WebSocket Security — protocol-level vulnerability discovery, payload mutation, headless DOM verification

Published Research

Basilisk: An Evolutionary AI Red-Teaming Framework for Systematic Security Evaluation of Large Language Models
Regaan · ROT Independent Security Research Lab · March 2026
📄 DOI: 10.5281/zenodo.18909538 · Indexed: OpenAIRE · License: CC BY 4.0

Introduces Smart Prompt Evolution (SPE-NL) — a genetic algorithm treating adversarial prompts as organisms under selection pressure. 29 attack modules across 8 OWASP LLM Top 10 categories. 92% improvement in attack success rate over static payload libraries at generation 5.


Flagship Projects

Basilisk — AI/LLM Red Teaming Framework

PyPI License DOI Figshare OSF

Open-source framework for systematic adversarial security evaluation of Large Language Models using evolutionary computation.

  • SPE-NL engine — genetic algorithm with 10 mutation operators, 5 crossover strategies, multi-signal fitness function
  • 29 attack modules — prompt injection, system prompt extraction, data exfiltration, tool abuse, guardrail bypass, DoS, multi-turn manipulation, RAG attacks
  • 100+ LLM providers via LiteLLM abstraction layer
  • Differential testing — simultaneous cross-provider behavioral divergence analysis
  • Non-destructive posture assessment — production-safe guardrail grading (A+ to F)
  • SARIF 2.1.0 output for GitHub Code Scanning integration
  • Cryptographic audit trail — SHA-256 chain integrity, auto secret redaction
pip install basilisk-ai
basilisk scan --target https://your-llm-endpoint.com --mode standard

WSHawk — WebSocket Security Scanner

Stars

Enterprise-grade distributed WebSocket security testing framework. 900+ repository clones · 120+ active developers.

  • Genetic payload mutation engine with 22k+ corpus
  • Headless DOM verification via Playwright
  • 22 integrated web pentesting modules (XSS, SQLi, SSRF, OAST)
  • Real-time MitM interceptor
  • Distributed fuzzing architecture in Go

ProtoCrash — Protocol Fuzzer

Coverage-guided mutation fuzzer for network protocol implementations. 350k+ executions/sec in distributed environments.

PoCSmith — AI Exploit Assistant

LLM fine-tuned on 1,400+ exploit samples and CVE data for automated proof-of-concept generation and shellcode research.

Modern WAF bypass tamper scripts targeting Cloudflare, AWS WAF, and Azure WAF using 2025 evasion techniques.

RedLang — Security Research Language

LLVM-based statically typed systems language engineered for offensive security research and high-performance exploit primitives.

Keikaku — Interpreted Language

Interpreted language with native async/await, advanced generators, and deterministic control flow.


Technical Stack

Domain Technologies
Languages Go · C · C++ · Python · TypeScript
Offensive Security Protocol Fuzzing · LLM Red Teaming · WAF Bypass · WebSocket Security · Adversary Simulation
Systems Linux Internals · Syscalls · TCP/IP · LLVM · Bytecode VMs · Windows Internals
Infrastructure Docker · Redis · PostgreSQL · GitHub Actions · PyPI · Electron
AI/ML Security Genetic Algorithms · Prompt Evolution · LLM Quantization · Adversarial ML

Achievements

  • 📜 Published Researcher — Basilisk paper, Zenodo DOI: 10.5281/zenodo.18909538 (2026)
  • 🎓 CEH — Certified Ethical Hacker, EC-Council (2025–2026)
  • 🏆 OffSec Echo — Completed 9 weeks: Forensics, Cloud, Malware Analysis
  • 🎤 Guest Lecturer — MIT App Development, DDGDVC Chennai (2026)
  • 🎤 Guest Speaker — Offensive R&D Workshop, Mohamed Sathak Polytechnic College (2026)
  • 🎤 Workshop Instructor — Modern Cyber Attack Engineering, eHackify (2025)

Connect

Platform Link
🌐 Website rothackers.com
🐦 X / Twitter @regaan_sec
💼 LinkedIn linkedin.com/in/regaan
🔬 ORCID 0009-0006-3683-7824
📄 Research DOI: 10.5281/zenodo.18909538

All security research and tooling is conducted in authorized environments only.
ROT Independent Security Research Lab · © 2026 Regaan

Pinned Loading

  1. graphql-scanner graphql-scanner Public

    Advanced GraphQL vulnerability scanner with async support, 100+ attack payloads, field fuzzing, and Burp Suite integration.

    Python 1

  2. sqlmap-tamper-collection sqlmap-tamper-collection Public

    Modern WAF bypass tamper scripts for SQLMap targeting Cloudflare, AWS WAF, and Azure WAF using 2025 evasion techniques.

    Python 6 1

  3. wshawk wshawk Public

    Enterprise-grade WebSocket security scanner with Smart Payload Evolution, real-time MitM interceptor, and 22 integrated web pentesting tools. Built for penetration testers, bug bounty hunters, and …

    Python 5 1

  4. PoCSmith PoCSmith Public

    PoCSmith is an AI model fine-tuned on exploit code and CVE data to assist security researchers in generating proof-of-concept exploits and shellcode for defensive purposes

    Python 1

  5. ProtoCrash ProtoCrash Public

    ProtoCrash is a smart mutation-based fuzzer designed to find crashes and vulnerabilities in network protocol implementations. Built with intelligent feedback-driven fuzzing techniques, it targets c…

    Python

  6. basilisk basilisk Public

    Basilisk — Open-source AI red teaming framework with genetic prompt evolution. Automated LLM security testing for GPT-4, Claude, Gemini. OWASP LLM Top 10 coverage. 29 attack modules.

    Python 4