Atul Agarwal Profile
Atul Agarwal

@atulagarwal

Followers
535
Following
2K
Media
33
Statuses
1K

Founder/CEO @Secfence; co-founder @AdPushup (exited)

India
Joined March 2009
Don't wanna be here? Send us removal request.
@0x_shaq
faulty *ptrrr
4 months
iykyk
3
17
102
@atulagarwal
Atul Agarwal
9 months
Happy to support the very best. We’d be there at OffensiveCon, yet again!!
@offensive_con
offensivecon
9 months
Many thanks to @secfence for their diversity sponsorship and help in empowering the community!
0
1
9
@secfence
Secfence
10 months
Happy to sponsor @nullcon We are hiring for multiple positions, DM us and we would love to meet you at #Nullcon2025
0
2
3
@secfence
Secfence
1 year
Come see us at #BHMEA24 at the @DSCI_Connect India Pavilion - H1 T91 We are showcasing are Next-Gen Mobile Forensics Platform!
0
1
12
@secfence
Secfence
2 years
We have a spare #37c3 pass. If anyone is interested, please feel free to DM! #37c3 #ChaosCommunicationCongress
0
2
6
@nullcon
NULLCON
3 years
😎We are excited to Welcome back our sustaining sponsor Secfence @secfence as 🎴Lanyard Sponsor Stay updated here ➡️ https://t.co/kqTyO6rNqw #NullconGoa2023 #Infosec #Conference
0
4
13
@atulagarwal
Atul Agarwal
3 years
Let’s catch up! :)
@secfence
Secfence
3 years
We’re at @offensive_con! Come say Hi!
0
0
4
@secfence
Secfence
3 years
We’re at #Zer0Con2023! Come say Hi!
0
1
11
@atulagarwal
Atul Agarwal
3 years
Always happy to support exceptional research & talent! We will be there, let’s meet up :)
@POC_Crew
POC_Crew
3 years
[Zer0Con2023] "Silver Sponsor" Thanks to Secfence(@secfence) for sponsoring the "Silver" Secfence is an Offensive Security company specialising in vulnerability research & turnkey platforms. #Zer0Con2023
0
0
7
@secfence
Secfence
3 years
We’ll be at @hexacon_fr, Paris. Come say Hi! We’re hiring for full time/contractual positions.
0
1
2
@atulagarwal
Atul Agarwal
3 years
I’m attending, would love to chat about most things infosec DM to meet up :)
@secfence
Secfence
3 years
Proud to sponsor @nullcon We're here, DM to meet us. We're hiring too!
0
0
2
@secfence
Secfence
3 years
Proud to sponsor @nullcon We're here, DM to meet us. We're hiring too!
0
2
1
@fede_k
Federico Kirschbaum
3 years
Popping shells @defcon. More than 20 vendors affected to an RCE in the network stack. Do you know what does your router is running? https://t.co/Ip1lG0CxKf
6
48
160
@ProjectZeroBugs
Project Zero Bugs
3 years
Windows: Credential Guard Domain-joined Device Public Key EoP
0
8
30
@ProjectZeroBugs
Project Zero Bugs
3 years
The quantum state of Linux kernel garbage collection CVE-2021-0920 (Part I)
1
45
139
@dr4k0nia
dr4k0nia
3 years
New blog post for HInvoke. It allows calling .NET runtime functions or accessing properties using only hashes as identifiers. Reducing obvious identifiers for analysts. Post also includes a little trick to avoid using PInvoke. https://t.co/thYuk3NoQ5
0
80
174
@atulagarwal
Atul Agarwal
3 years
Just like Spaghetti code
0
0
0
@atulagarwal
Atul Agarwal
3 years
Proud of our continued support to the OG Indian infosec conference 🤟🏻
@nullcon
NULLCON
3 years
⭐Sponsor Alert! 🙌We are happy to Welcome @secfence as our Lanyard sponsor 😎Checkout all the Conference updates & 🎟️Grab your tickets➡️ https://t.co/Z7aFoQorQt #NullconGoa2022 #Conference #infosec #cybersecurity
0
2
14
@mmolgtm
Man Yue Mo
4 years
This is probably the most complex exploit I've done so far. A UAF in Android kernel freed by kfree_rcu (introduces a delay) in a tight race + kCFI + Samsung RKP. Yet its still possible to gain arbitrary kernel RW, disable SE and root from untrusted app.
Tweet card summary image
github.blog
In this post I’ll exploit CVE-2022-22057, a use-after-free in the Qualcomm gpu kernel driver, to gain root and disable SELinux from the untrusted app sandbox on a Samsung Z flip 3. I’ll look at...
4
162
505
@bl4sty
blasty
4 years
Dirty Pipe PoC ( https://t.co/ql5Y8pWDBj) works beautifully. 🤑
1
167
533