| Website | https://ringzer0.training |
| Website | https://ringzer0.training |
🇨🇦 I'll also be presenting a hands-on, step-by-step version of "Reversing a (not-so-) Simple Rust Loader" as a workshop at Ringzer0 COUNTERMEASURE in Ottawa, Canada on November 7, 2025! We will be reversing the Rust malware sample in this article together.
https://ringzer0.training/countermeasure25-workshop-reversing-a-not-so-simple-rust-loader/
Hope to see you at @ringzer0 in Ottawa!
#malware #rust #rustlang #infosec #ReverseEngineering #MalwareAnalysis #infostealer #ringzer0
Rust can be challenging for even experienced reverse engineers. We will reverse a simple Rust malware loader found in the wild with obfuscated strings and a decoy payload, making it a good example for learning Rust reversing concepts like threads, dynamic dispatch, and type recovery.