FuzzingLabs Academy/Go Binary Reversing & Analysis

  • $2,400

Go Binary Reversing & Analysis

  • Course

Learn how to reverse engineer Golang binaries in this hands-on 2‑day training. You’ll explore Go’s runtime, calling conventions, goroutines, and interfaces, and tackle stripped and obfuscated binaries. Analyze real Go-based malware and write detection rules using tools like IDA, Ghidra and GDB. ⚠️ This training is in pre‑sales and will be released in 3 months.

What you'll learn

Go is increasingly popular among malware developers thanks to its static linking, minimal symbol information, and robust concurrency model making it one of the hardest modern languages to reverse engineer.

In this hands-on training, you’ll learn to reverse Go binaries using tools like Ghidra, GDB, and IDA. You’ll explore the Go runtime, uncover how goroutines, channels, and interfaces work under the hood, and understand Go’s unique calling conventions and binary layout.

You’ll tackle the challenges of stripped Go binaries, analyze malware samples, and discover how attackers abuse Go’s packaging and concurrency features to hide functionality and evade detection.

Through practical exercises and real-world case studies, you’ll develop the skills to confidently reverse Go binaries, triage complex behaviors, and write YARA rules tailored to Go-based malware.

This training gives you a complete methodology and tooling workflow for analyzing modern Golang threats in the field.

Trusted by Security Engineers at Leading Companies

What you'll learn

Day 1 – Go Reverse Engineering: Fundamentals & Tooling

Module 1: Introduction to Go & Reversing Basics

  • Why malware authors use Go

  • Compilation flow (go build/install), memory model

  • Reverse a simple Go binary

Module 2: Runtime & Binary Layout

  • Calling conventions, function naming, Go structures

  • Use of Ghidra, Radare2, IDA, and GDB

Module 3: Control Flow & Interfaces

  • Understanding interfaces, maps, slices, error handling

  • Exercise: Analyze Go binary control flow

Day 2 – Advanced Go Reversing & Malware Analysis

Module 4: Advanced Features & Obfuscation

  • Reversing goroutines, channels, mutexes, reflection

  • Challenges with stripped Go binaries

Module 5: Malware Case Studies

  • Real Go malware samples

  • Writing YARA rules for Go binaries

  • Reverse engineer a packed/malicious Go binary

Module 6: Final Capstone Project

  • Reverse a complex Go application using full toolchain

  • Combine Rust & Go reversing techniques

  • Final review, open Q&A, extra resources

⚙️ Partnership with Hex-rays

We have a partnership with Hex-rays to get our students IDA Classroom licenses.


What's included?

🔑 Immediate access to all the content
⏱️ Hours of curated and practical knowledge
🎞️ Easy-to-digest, on-demand videos
👨‍💻 Hands-on exercises & labs
♾️ Lifetime access
📖 Digital and printable slides
📝 Assignments to apply your new skills
💯 Certificate of completion

Who should attend?

This course is for anyone looking for a hands-on and pragmatic approach to reverse engineering and analyzing modern binaries written in Go, including:

✔ Software developers
✔ Security engineers
✔ Vulnerability researchers
✔ Malware analysts

🔥 Delivered at POC & REcon

This training was selected and taught at POC & REcon, two of the world’s leading offensive security conferences in the world.

  • $2,400

Go Binary Reversing & Analysis

  • Course

Learn how to reverse engineer Golang binaries in this hands-on 2‑day training. You’ll explore Go’s runtime, calling conventions, goroutines, and interfaces, and tackle stripped and obfuscated binaries. Analyze real Go-based malware and write detection rules using tools like IDA, Ghidra and GDB. ⚠️ This training is in pre‑sales and will be released in 3 months.

Recognized by the Global Security Community

We speak, train, and compete at the world’s most respected security conferences.

FREE Resources & Trainings

Enter your email to receive special deals and a bundle of awesome resources. 100% free - 100% awesome. 👇

You're signing up to receive emails from FuzzingLabs Academy

Frequently Asked Questions

Please, contact us here if you have any other question!

How to get access to my Fuzzing Labs courses?

FuzzingLabs is using the podia.com platform to provide the course materials.
Immediately after placing your order, you will receive an email with your login details. 

I can't or don't want to pay with Paypal or a credit card, can I still join?

Yes of course, just send me an email at fuzzinglabs@gmail.com and we will see how to make it work.

I would prefer to have an online/onsite LIVE training experience, is it possible?

We also offer all the training on this platform in a LIVE online format upon request.
Customization of on-site/online training can also be possible for small groups of attendees and depending on the timezone. Don't hesitate to contact me by mail, the popup chat, or using this form.

For how long I get access to the course?

Any courses in the FuzzingLabs Academy come with life-time access.

Will the training be updated in the future?

Courses will be updated over time and you will receive a notification email.

I'm a student, can I have a special discount?

Yes ;) Send me a message using the chat popup and we will discuss the requirement.