Skip Navigation
Get a Demo
 

Carl Petty

At Red Canary, Carl performs research on known and unknown adversary techniques to inform production direction. He has experience with both offensive and defensive operations. Carl's goal is to help customers detect threats before it impacts their business.
Playing with Process Memory Integrity on Linux
Playing with Process Memory Integrity on Linux
Chain Reactor: Adversary Simulation on Linux
Chain Reactor: Adversary Simulation on Linux
Unlocking Heaven’s Gate on Linux
Unlocking Heaven’s Gate on Linux
Introducing Chain Reactor
Introducing Chain Reactor

Security gaps? We got you.

Get curated insights on managed detection and response (MDR) services, threat intelligence, and security operations—delivered straight to your inbox every month.


 
 
Back to Top