Reversing Modern Binaries: Practical Rust & Go Analysis


Instructors:  Daniel Frederic & Mathieu Hoste
Dates:  June 23 to 26 2025
Capacity:   25 Seats





This 4-day training combines two comprehensive modules, focusing on reverse engineering Rust binaries (Days 1-2) and Golang binaries (Days 3-4). Participants will gain hands-on experience with tools, techniques, and advanced malware analysis, concluding with a capstone project to reinforce their skills. Designed for malware analysts, reverse engineers, and security professionals, this course provides the knowledge needed to tackle real-world reverse engineering challenges in modern programming languages.



KEY LEARNING OBJECTIVES




Course Topics



Day 1: Rust Reverse Engineering - Fundamentals and Tooling

Module 1: Introduction to Rust and Reverse Engineering


Module 2: Rust Compilation and Runtime


Module 3: Analyzing Rust Structures and Control Flow



Day 2: Advanced Rust Reversing and Malware Analysis

Module 4: Tools and Techniques for Rust Reverse Engineering


Module 5: Advanced Reverse Engineering and Obfuscation Techniques


Module 6: Advanced Malware Reverse Engineering Techniques in Rust


Module 7: Rust Malware Analysis



Day 3: Golang Reverse Engineering - Fundamentals and Tooling

Module 8: Introduction to Golang and Reverse Engineering


Module 9: Basics of Golang Reversing


Module 10: Analyzing Go Structures and Control Flow



Day 4: Advanced Golang Reversing and Malware Analysis

Module 11: Advanced Go Reversing Techniques


Module 12: Go Malware Analysis


Module 13: Capstone Project and Conclusion



Prerequisites




HARDWARE REQUIREMENTS




SOFTWARE REQUIREMENTS




WHO SHOULD ATTEND


Malware analysts, reverse engineers, security researchers, vulnerability researchers, software developers



Bio


Daniel Frederic is a security researcher at Fuzzinglabs and the current head of the CTF team at LSE. Originally a kernel and low-level developer with a passion for reverse engineering, he merges these interests by focusing on low-level targets. His research primarily involves developing low-level fuzzing tools through in-depth exploration of often obscure targets.






Mathieu Hoste is a security engineer at FuzzingLabs, he is a cybersecurity enthusiast who began his journey in reverse engineering and especially Rust. Over time, his passion led him to specialize in blockchain vulnerability research. At FuzzingLabs, he focuses on uncovering critical flaws in Ethereum using advanced fuzzing techniques to improve the security of the blockchain ecosystem.



To Register

Click here to register.