I’ve been working on Veilgen, a tool designed to generate fully synthetic, encrypted fake data for security testing and red teaming. Unlike real or scraped data, Veilgen creates randomized structured data, making it ideal for:
Testing AI-driven detection systems without exposing real data. Simulating SSRF/RCE payloads with obfuscated and encrypted inputs. Eypassing security filters using structured yet unpredictable fake data. Running on Android/Linux with optional root features for deeper security analysis.
Since modern security systems rely heavily on AI-based anomaly detection, traditional evasion techniques are becoming less effective. How do you approach generating fake data for testing? What’s the biggest challenge in bypassing detection systems?
Would love to hear your feedback
Regarding machine learning, it's definitely something we've been exploring. Integrating ML could allow the synthetic data to adapt more dynamically to evolving detection systems. This approach could help ensure that the generated data continues to evade detection as detection mechanisms become more sophisticated. We're excited to see how this technology can evolve and improve with time