Skip Navigation
Get a Demo
 

Carl Petty

At Red Canary, Carl performs research on known and unknown adversary techniques to inform production direction. He has experience with both offensive and defensive operations. Carl's goal is to help customers detect threats before it impacts their business.
Playing with Process Memory Integrity on Linux
Playing with Process Memory Integrity on Linux
Chain Reactor: Adversary Simulation on Linux
Chain Reactor: Adversary Simulation on Linux
Unlocking Heaven’s Gate on Linux
Unlocking Heaven’s Gate on Linux
Introducing Chain Reactor
Introducing Chain Reactor

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top