Independent Security Researcher
2020 - Present
Focusing on high-impact Bug Bounty programs. Conducting deep-dive analysis of web applications and APIs. Responsible for uncovering multiple critical vulnerabilities in enterprise-level software.
Security Researcher | Bug Bounty Hunter | Penetration Tester
I am a passionate Cyber Security Researcher and Bug Bounty Hunter with a strong focus on Web Application Security. My mission is to identify critical vulnerabilities in high-profile platforms before malicious actors can exploit them.
With a proven track record in the Hall of Fame of tech giants like Microsoft and Google, I specialize in identifying complex logic flaws, authentication bypasses, and injection attacks. I am constantly learning, sharing knowledge with the community, and helping organizations secure their digital assets.
Focusing on high-impact Bug Bounty programs. Conducting deep-dive analysis of web applications and APIs. Responsible for uncovering multiple critical vulnerabilities in enterprise-level software.
Completed advanced penetration testing courses and practical exams. Focused on simulating real-world attack scenarios and red teaming operations.
Began the journey into ethical hacking. Mastered the fundamentals of networking, Linux, and basic web exploitation techniques.
A log of critical vulnerabilities discovered and assigned CVE IDs.
Recognized by industry leaders for responsible vulnerability disclosure.
Reported critical vulnerabilities in Microsoft services and Azure infrastructure.
Identified security flaws in Google web applications and Android ecosystem components.
Acknowledged for responsible disclosure of bugs affecting financial transaction flows.
Reported high-risk vulnerabilities in the Uber internal systems.
We would like to express our sincere gratitude for the detailed vulnerability report submitted. Gurudatt's analysis was thorough and helped us secure a critical endpoint before it could be exploited.
Thank you for your continuous contribution to our bug bounty program. The recent finding regarding the authentication bypass was exceptional and demonstrates high-level technical proficiency.
Gurudatt's report was not just a finding; it was a complete root cause analysis with proof of concept. This level of detail is rare and highly appreciated by our engineering team.
Moments from workshops, CTFs, and community training sessions.
eLearnSecurity Web Application Penetration Tester eXtreme
Advanced certification validating expert-level skills in black-box web application penetration testing.
eLearnSecurity Certified Professional Penetration Tester
Comprehensive certification covering network infrastructure, web apps, and system penetration testing.
Certified Ethical Hacker
Mastering the latest tools and methodologies used by hackers to lawfully assess the security of systems.