Atul Agarwal
@atulagarwal
Followers
535
Following
2K
Media
33
Statuses
1K
Founder/CEO @Secfence; co-founder @AdPushup (exited)
India
Joined March 2009
Happy to support the very best. We’d be there at OffensiveCon, yet again!!
0
1
9
Happy to sponsor @nullcon We are hiring for multiple positions, DM us and we would love to meet you at #Nullcon2025
0
2
3
Come see us at #BHMEA24 at the @DSCI_Connect India Pavilion - H1 T91 We are showcasing are Next-Gen Mobile Forensics Platform!
0
1
12
We have a spare #37c3 pass. If anyone is interested, please feel free to DM! #37c3 #ChaosCommunicationCongress
0
2
6
😎We are excited to Welcome back our sustaining sponsor Secfence @secfence as 🎴Lanyard Sponsor Stay updated here ➡️ https://t.co/kqTyO6rNqw
#NullconGoa2023 #Infosec #Conference
0
4
13
Let’s catch up! :)
0
0
4
Always happy to support exceptional research & talent! We will be there, let’s meet up :)
[Zer0Con2023] "Silver Sponsor" Thanks to Secfence(@secfence) for sponsoring the "Silver" Secfence is an Offensive Security company specialising in vulnerability research & turnkey platforms. #Zer0Con2023
0
0
7
We’ll be at @hexacon_fr, Paris. Come say Hi! We’re hiring for full time/contractual positions.
0
1
2
I’m attending, would love to chat about most things infosec DM to meet up :)
0
0
2
Popping shells @defcon. More than 20 vendors affected to an RCE in the network stack. Do you know what does your router is running? https://t.co/Ip1lG0CxKf
6
48
160
Windows: Credential Guard Domain-joined Device Public Key EoP
0
8
30
The quantum state of Linux kernel garbage collection CVE-2021-0920 (Part I)
1
45
139
New blog post for HInvoke. It allows calling .NET runtime functions or accessing properties using only hashes as identifiers. Reducing obvious identifiers for analysts. Post also includes a little trick to avoid using PInvoke. https://t.co/thYuk3NoQ5
0
80
174
Proud of our continued support to the OG Indian infosec conference 🤟🏻
⭐Sponsor Alert! 🙌We are happy to Welcome @secfence as our Lanyard sponsor 😎Checkout all the Conference updates & 🎟️Grab your tickets➡️ https://t.co/Z7aFoQorQt
#NullconGoa2022 #Conference #infosec #cybersecurity
0
2
14
This is probably the most complex exploit I've done so far. A UAF in Android kernel freed by kfree_rcu (introduces a delay) in a tight race + kCFI + Samsung RKP. Yet its still possible to gain arbitrary kernel RW, disable SE and root from untrusted app.
github.blog
In this post I’ll exploit CVE-2022-22057, a use-after-free in the Qualcomm gpu kernel driver, to gain root and disable SELinux from the untrusted app sandbox on a Samsung Z flip 3. I’ll look at...
4
162
505