Skip to content
View noobforanonymous's full-sized avatar

Block or report noobforanonymous

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
noobforanonymous/README.md

πŸ‘‹ Hey, I'm Regaan

πŸ”΄ Red Team Operator & Security Researcher
πŸ’» Full-Stack Developer | Systems Programmer
πŸ› οΈ Creator of Red Lang β€” a custom offensive security research language


🧠 About Me

I'm a security-focused developer who works across low-level systems, backend services, and full-stack applications.
My background spans:

  • βš”οΈ Red team operations & adversary simulation (authorized environments only)
  • 🧡 Systems programming in C, C++, Rust
  • 🐍 Rapid tooling & automation in Python
  • 🌐 Full-stack development (front-end + back-end)
  • πŸ› οΈ Designing and experimenting with cross-platform security tools
  • πŸ§ͺ Building and testing my own research language: Red Lang

I focus heavily on detection engineering, bypass research, and building secure, reproducible tooling for legitimate red-team and defensive studies.


πŸš€ Projects & Skills

πŸ”§ Core Languages

  • C / C++ β€” low-level, systems, performance-critical tools
  • Rust β€” safe systems programming & cross-platform development
  • Python β€” automation, scripting, PoCs
  • Red Lang β€” my own experimental research language

🌐 Software Development

  • Full-stack applications
  • API design
  • Web tooling
  • Backend security engineering

πŸ›‘οΈ Security Research

  • Adversary emulation
  • Tooling for EDR/AV testing in authorized labs
  • Cross-platform execution research
  • Payload delivery & detection-resistant techniques (legitimate testing only)

🧭 Ethos

I build tools for research, learning, and professional red-team operations only.
Everything I create is intended for authorized environments, security improvement, and strengthening defensive programs.


πŸ“¬ Connect


⚠️ Disclaimer

All security-related tools, experiments, and research are meant strictly for authorized environments.
I do not support or condone illegal use of security tooling.

Pinned Loading

  1. c2client c2client Public

    Command and Control (C2) client for legitimate security research, red-team operations, and defender training to understand C2 mechanisms.

    Python

  2. graphql-scanner graphql-scanner Public

    Advanced GraphQL vulnerability scanner with async support, 100+ attack payloads, field fuzzing, and Burp Suite integration.

    Python

  3. offsec-echo-response-writeups offsec-echo-response-writeups Public

    Comprehensive writeups for all 8 weeks of the OffSec Echo Response challenge series with detailed security investigations and analysis.

  4. sqlmap-tamper-collection sqlmap-tamper-collection Public

    Modern WAF bypass tamper scripts for SQLMap targeting Cloudflare, AWS WAF, and Azure WAF using 2025 evasion techniques.

    Python 2

  5. wshawk wshawk Public

    Professional WebSocket security scanner with real XSS verification, OAST integration, session hijacking tests, and CVSS scoring. 22K+ payloads included.

    Python 1