Go is increasingly popular among malware developers thanks to its static linking, minimal symbol information, and robust concurrency model making it one of the hardest modern languages to reverse engineer.
In this hands-on training, you’ll learn to reverse Go binaries using tools like Ghidra, GDB, and IDA. You’ll explore the Go runtime, uncover how goroutines, channels, and interfaces work under the hood, and understand Go’s unique calling conventions and binary layout.
You’ll tackle the challenges of stripped Go binaries, analyze malware samples, and discover how attackers abuse Go’s packaging and concurrency features to hide functionality and evade detection.
Through practical exercises and real-world case studies, you’ll develop the skills to confidently reverse Go binaries, triage complex behaviors, and write YARA rules tailored to Go-based malware.
This training gives you a complete methodology and tooling workflow for analyzing modern Golang threats in the field.
Trusted by Security Engineers at Leading Companies
Module 1: Introduction to Go & Reversing Basics
Why malware authors use Go
Compilation flow (go build/install), memory model
Reverse a simple Go binary
Module 2: Runtime & Binary Layout
Calling conventions, function naming, Go structures
Use of Ghidra, Radare2, IDA, and GDB
Module 3: Control Flow & Interfaces
Understanding interfaces, maps, slices, error handling
Exercise: Analyze Go binary control flow
Module 4: Advanced Features & Obfuscation
Reversing goroutines, channels, mutexes, reflection
Challenges with stripped Go binaries
Module 5: Malware Case Studies
Real Go malware samples
Writing YARA rules for Go binaries
Reverse engineer a packed/malicious Go binary
Module 6: Final Capstone Project
Reverse a complex Go application using full toolchain
Combine Rust & Go reversing techniques
Final review, open Q&A, extra resources
We have a partnership with Hex-rays to get our students IDA Classroom licenses.
🔑 Immediate access to all the content
⏱️ Hours of curated and practical knowledge
🎞️ Easy-to-digest, on-demand videos
👨💻 Hands-on exercises & labs
♾️ Lifetime access
📖 Digital and printable slides
📝 Assignments to apply your new skills
💯 Certificate of completion
This course is for anyone looking for a hands-on and pragmatic approach to reverse engineering and analyzing modern binaries written in Go, including:
✔ Software developers
✔ Security engineers
✔ Vulnerability researchers
✔ Malware analysts
This training was selected and taught at POC & REcon, two of the world’s leading offensive security conferences in the world.
We speak, train, and compete at the world’s most respected security conferences.
Please, contact us here if you have any other question!