π΄ Red Team Operator & Security Researcher
π» Full-Stack Developer | Systems Programmer
π οΈ Creator of Red Lang β a custom offensive security research language
I'm a security-focused developer who works across low-level systems, backend services, and full-stack applications.
My background spans:
- βοΈ Red team operations & adversary simulation (authorized environments only)
- π§΅ Systems programming in C, C++, Rust
- π Rapid tooling & automation in Python
- π Full-stack development (front-end + back-end)
- π οΈ Designing and experimenting with cross-platform security tools
- π§ͺ Building and testing my own research language: Red Lang
I focus heavily on detection engineering, bypass research, and building secure, reproducible tooling for legitimate red-team and defensive studies.
- C / C++ β low-level, systems, performance-critical tools
- Rust β safe systems programming & cross-platform development
- Python β automation, scripting, PoCs
- Red Lang β my own experimental research language
- Full-stack applications
- API design
- Web tooling
- Backend security engineering
- Adversary emulation
- Tooling for EDR/AV testing in authorized labs
- Cross-platform execution research
- Payload delivery & detection-resistant techniques (legitimate testing only)
I build tools for research, learning, and professional red-team operations only.
Everything I create is intended for authorized environments, security improvement, and strengthening defensive programs.
- π LinkedIn: https://www.linkedin.com/in/regaan/
- πΈ Instagram: https://www.instagram.com/programmingaddicted/
All security-related tools, experiments, and research are meant strictly for authorized environments.
I do not support or condone illegal use of security tooling.