Reversing Modern Binaries: Practical Rust & Go Analysis


Instructors:  Daniel Frederic & Mathieu Hoste
Dates:  June 15 to 18 2026
Capacity:  25


This 4-day training combines two comprehensive modules, focusing on reverse engineering Rust binaries (Days 1-2) and Golang binaries (Days 3-4). Participants will gain hands-on experience with tools, techniques, and advanced malware analysis, concluding with a capstone project to reinforce their skills. Designed for malware analysts, reverse engineers, and security professionals, this course provides the knowledge needed to tackle real-world reverse engineering challenges in modern programming languages.


Key Learning Objectives




Course Topics


Day 1: Rust Reverse Engineering - Fundamentals and Tooling


Day 2: Advanced Rust Reversing and Malware Analysis


Day 3: Golang Reverse Engineering - Fundamentals and Tooling


Day 4: Advanced Golang Reversing and Malware Analysis



Prerequisites




Hardware Requirements




Software Requirements




Who Should Attend


Malware analysts, reverse engineers, security researchers, vulnerability researchers, software developers



BIO


Daniel Frederic Daniel Frederic is a security researcher at Fuzzinglabs and the current head of the CTF team at LSE. Originally a kernel and low-level developer with a passion for reverse engineering, he merges these interests by focusing on low-level targets. His research primarily involves developing low-level fuzzing tools through in-depth exploration of often obscure targets.





Mathieu Hoste Mathieu Hoste is a security engineer at FuzzingLabs, he is a cybersecurity enthusiast who began his journey in reverse engineering and especially Rust. Over time, his passion led him to specialize in blockchain vulnerability research. At FuzzingLabs, he focuses on uncovering critical flaws in Ethereum using advanced fuzzing techniques to improve the security of the blockchain ecosystem.



To Register

Click here to register.


Hex-Rays Magnet Forensics Trail of Bits