We build open source offensive security tools for penetration testers, red teamers, bug bounty hunters, and security researchers.
Our work focuses on areas where traditional testing tools fall short — stateful protocols, AI-powered systems, binary targets, and autonomous security operations.
| Project | What It Does |
|---|---|
| WSHawk | WebSocket and HTTP security testing platform with 22 integrated pentest tools, project-backed evidence, identity-aware replay, and cross-protocol attack workflows. |
| Rothalyx | Cross-platform reverse engineering framework for binary analysis, disassembly, decompilation, debugging, and security research. |
| Basilisk | AI red teaming framework using evolutionary computation for systematic security evaluation of large language models. |
| XYSTRON | Autonomous offensive security platform with AI-driven tool orchestration and approval-gated execution. |
Offensive tooling — building the tools we wish existed when testing real targets.
Protocol security — WebSocket, GraphQL subscriptions, Socket.IO, and other stateful protocols that HTTP-only scanners miss.
AI security — red teaming LLMs and building frameworks to evaluate guardrail effectiveness at scale.
Binary analysis — static and dynamic reverse engineering with decompilation, debugging, and exploit workflow integration.
Autonomous operations — AI-assisted reconnaissance, attack planning, and evidence collection with human oversight.
We publish research, maintain active vulnerability disclosure pipelines, and contribute to the security community through open tooling and documentation.
Published work is indexed on OpenAIRE and Zenodo.
rothackers.com · zara.rothackers.com · PyPI · LinkedIn
Founded and maintained by Regaan R — Chennai, India.