Hi, I'm Yash Dipak Pawar. Red Team Operator.

Information Security Consultant specializing in red teaming and adversary simulation across enterprise environments. Experienced in Active Directory attacks, web and API exploitation, wireless attacks, and physical security assessments. I focus on identifying real-world attack paths demonstrating business impact and delivering actionable remediation strategies.

About memy stats

Information About me

Beyond technical testing, I provide security consulting by translating complex vulnerabilities into actionable remediation strategies. I have also delivered 300+ hours of cybersecurity training across multiple domains including web, API, network, and mobile security.

30+

Projects
Completed

3.5+

Years of
experience

11+

Medium
WriteUps

01+

Research Pappers
Publications

My Skills

Red Teaming and VAPT

95%

Applciation Security

85%

Cloud and Infrastructure Security

75%

Wireless and Physical Pentesting

80%

Mobile Application & Thick Client

87%

Node & REST API Devlopment

70%

My Timeline

01/2026 - Present

Information Security Consultant - qSEAp Infotech Pvt Ltd

Full-time Information Security Instructor at Mrwebsecure. Instructing on Ethical Hacking, Network Security, WAPT, and VAPT.

01/2025 - 2025

Information Security Instructor - Mrwebsecure Infosolutions

Full-time Information Security Instructor at Mrwebsecure. Instructing on Ethical Hacking, Network Security, WAPT, and VAPT.

12/2022 - 03/2023

Cyber Security Intern - Cyber Secured India

Cyber Security · WAPT · Digital Forensics · Computer Networking · Linux · Penetration Testing.

2021 - 2025

CSE Cyber Security - Savitribai Phule Pune University

GH Raisoni College of Engineering and Management, Wagholi, Pune.

2019 - 2021

HSC - Savitribai Phule Pune University

Amrutvahini Model School and Junior College, Sangamner.

My PortfolioMy Work

Security engagements delivered as an Information Security Consultant across enterprise environments for clients.

Red - Teaming

Application Security

Infrastructure Security

ATM Security

Physical Pentesting

Wireless Security

Cloud Security

My BlogsMy Blogs

Hidden Truth of Successful Bug Hunting

Hidden Truth of Successful Bug Hunting

Never overestimate the ease of finding bugs with basic tools and methodologies. Effective bug bounty requires deeper dive into system complexities.

Enola-Finds 'Information Gathering Tool'

Enola-Finds 'Information Gathering Tool'

I've created a tool called Enola-Finds to enhance and streamline OSINT investigations.

Mastering Netcat Tool

Mastering Netcat Tool

Netcat, commonly referred to as nc or Ncat, is one of the most powerful and versatile tools in a hacker or system administrator’s toolkit

BlueKeep Vulnerability CVE-2019–0708

BlueKeep Vulnerability CVE-2019–0708

CVE-2019–0708, popularly known as BlueKeep, is a critical remote code execution (RCE) vulnerability affecting older versions of Windows operating systems.

Passive Reconnaissance Techniques

Passive Reconnaissance Techniques

Passive reconnaissance is the initial stage in the process of ethical hacking, allowing you to gather as much information as possible about a target without directly interacting.

Exploring WebDAV Exploitation

Exploring WebDAV Exploitation

Two tools that help in this process are Cadaver and DavTest. Let’s explore how to use them to test WebDAV vulnerabilities.

Contact MeContact

Contact me here

Cybersecurity enthusiast on a learning journey, sharing insights and connecting with fellow hackers.

Location

: Pune, Maharashtra, India

Email

: yashpawar1199@gmail.com

Education

: GHRCEM, Pune, India

Mobile Number

: +91 7972646888

Languages

: Marathi, Hindi, English