The Team

The people
who break things
professionally.

gdata solution pairs hands-on offensive testing with disciplined client operations: one co-founder leads technical engagements; the other, a DMA, runs programmes, HR-facing coordination, and non-technical delivery so findings actually land with the business.

0
Engagements completed
0
Vulnerabilities found
0
Years combined experience
0+
Companies secured
/ FOUNDERS

Meet Gaurav & Gagan.

Complementary roles — technical offensive lead and DMA-led client, HR, and stakeholder management — with a shared conviction: you cannot defend what you haven't tried to break.

GC
Gaurav Chaudhary
Offensive Security Lead
GC
Gaurav Chaudhary
Co-founder · Offensive Security Lead
Background

Gaurav has spent years as a professional bug hunter and penetration tester, with a specialisation in web application and API security. He has discovered and responsibly disclosed critical vulnerabilities at scale — including auth bypasses, injection chains, and business logic flaws — across fintech, healthcare, and SaaS platforms. He takes an attacker-first mindset into every engagement, focusing not just on what is vulnerable but on what is actually exploitable and how an adversary would chain it.

Specialisations
Web Application Pentesting
API Security & REST/GraphQL
Red Team Operations
Bug Bounty Research
OWASP Top 10 & Beyond
Python · Bash · Burp Suite
Certifications
OSCP CEH eWPT BSCP
GR
Gagan Rexwal
DMA & client management
GR
Gagan Rexwal
Co-founder · DMA (Data Management Analyst) & client management
Background

Gagan runs the client-facing side of the practice. With a Data Management Analyst (DMA) lens, he structures engagement data — scope versions, evidence handoffs, report iterations, and procurement attachments — so nothing gets lost between your team and ours. He manages relationships with HR, people leaders, and business stakeholders alongside security and engineering sponsors: coordinating kickoffs, status touchpoints, and readouts in language that fits each audience. His focus is clarity, follow-through, and respectful coordination, not hands-on exploitation.

Focus areas (non-technical)
Client & account management
HR & people-team liaison
Stakeholder relations & expectations
Engagement scheduling & logistics
DMA: reporting packs & record hygiene
Executive & non-technical briefings
Professional strengths
Written comms Vendor coordination Confidentiality discipline Service mindset
/ HOW WE WORK

Our operating principles.

The things we refuse to compromise on, in every engagement we take.

01
Attacker-First Thinking

We don't scan and report. We think like the adversary — chaining weaknesses, escalating impact, and demonstrating real business risk. If it wouldn't fool a real attacker, it's not in our report.

02
Surgical, Not Noisy

We produce focused findings, not 200-page PDF dumps. Every item in our report is manually verified, clearly scoped, and accompanied by a working proof-of-concept and concrete remediation guidance.

03
Radical Transparency

You get full visibility — what we're testing, when, and how. Real-time updates during long-form engagements. No surprises, no black boxes. You're briefed at every stage of the operation.

04
Ethics, Non-Negotiable

Every engagement we conduct is fully authorised in writing. We operate within defined scope, maintain strict confidentiality, and adhere to responsible disclosure practices without exception.

05
Remediation Partnership

Finding vulnerabilities is the start, not the end. We stay available through the remediation cycle, answer developer questions, and retest every critical finding at no extra cost.

06
Continuous Learning

We maintain active CVE research, participate in bug bounty programmes, and compete in CTFs — ensuring our techniques reflect what adversaries are actually doing today, not two years ago.

Ready to work with us?