FuzzingLabs Academy/Rust Binary Reversing & Analysis

  • $2,400

Rust Binary Reversing & Analysis

Learn how to reverse engineer modern Rust binaries in this hands-on 2‑day training. You’ll analyze Rust structures, control flow, and calling conventions, and uncover obfuscation, malware techniques, and packed binaries. Use tools like IDA, GDB to tackle stripped and real-world Rust samples. ⚠️ This training is in pre‑sales and will be released in 3 months.

What you'll learn

Rust is quickly becoming a go-to language for malware developers thanks to its performance, safety features, and compiler complexity making it increasingly common in real-world threats and increasingly challenging for reverse engineers.

In this hands-on training, you’ll learn how to reverse engineer Rust binaries using tools like IDA, Ghidra, GDB and LLDB. You’ll dive into Rust’s compilation pipeline, understand its calling conventions, and dissect enums, traits, structs, and control flow constructs in stripped or obfuscated binaries.

You’ll also explore modern malware techniques implemented in Rust from process hollowing to API hooking and packer evasion. Through real-world case studies (like Luca Stealer) and targeted exercises, you’ll build your own workflow for analyzing and detecting Rust-based threats.

By the end of the training, you’ll be equipped to confidently reverse, analyze, and triage modern Rust binaries and write effective YARA rules for detection.

Trusted by Security Engineers at Leading Companies

Schedule

Day 1 – Rust Reverse Engineering: Fundamentals & Tooling

Module 1: Introduction to Rust & Reverse Engineering

  • History, features, and malware use cases

  • Setting up Ghidra, GDB, LLDB, Radare2

Module 2: Rust Compilation & Runtime

  • LLVM pipeline, symbol mangling, memory model

  • Linux & Windows runtime differences

Module 3: Structures & Control Flow in Rust

  • Reverse engineering enums, slices, traits, structs

  • Control flow analysis with practical exercises

Day 2 – Advanced Rust Reversing & Malware Analysis

Module 4: Tools & Techniques

  • Configuring Ghidra for Rust, debugging with LLDB/GDB

  • Advanced analysis of stripped binaries

Module 5: Obfuscation & Anti-Analysis

  • Reversing string obfuscation, anti-debugging, packers

  • Exercise: Analyze an obfuscated Rust binary

Module 6–7: Malware Techniques & Case Studies

  • Process hollowing, DLL injection, loader malware

  • Case study: Luca Stealer

  • Crafting YARA rules for Rust malware

⚙️ Partnership with Hex-rays

We have a partnership with Hex-rays to get our students IDA Classroom licenses


What's included?

🔑 Immediate access to all the content
⏱️ Hours of curated and practical knowledge
🎞️ Easy-to-digest, on-demand videos
👨‍💻 Hands-on exercises & labs
♾️ Lifetime access
📖 Digital and printable slides
📝 Assignments to apply your new skills
💯 Certificate of completion

Who should attend?

This course is for anyone looking for a hands-on and pragmatic approach to reverse engineering and analyzing modern binaries written in Rust including:

✔ Software developers
✔ Security engineers
✔ Vulnerability researchers
✔ Malware analysts

🔥 Delivered at POC & REcon

This training was selected and taught at POC & REcon, two of the world’s leading offensive security conferences in the world.

  • $2,400

Rust Binary Reversing & Analysis

Learn how to reverse engineer modern Rust binaries in this hands-on 2‑day training. You’ll analyze Rust structures, control flow, and calling conventions, and uncover obfuscation, malware techniques, and packed binaries. Use tools like IDA, GDB to tackle stripped and real-world Rust samples. ⚠️ This training is in pre‑sales and will be released in 3 months.

Recognized by the Global Security Community

We speak, train, and compete at the world’s most respected security conferences.

FREE Resources & Trainings

Enter your email to receive special deals and a bundle of awesome resources. 100% free - 100% awesome. 👇

You're signing up to receive emails from FuzzingLabs Academy

Frequently Asked Questions

Please, contact us here if you have any other question!

How to get access to my Fuzzing Labs courses?

FuzzingLabs is using the podia.com platform to provide the course materials.
Immediately after placing your order, you will receive an email with your login details. 

I can't or don't want to pay with Paypal or a credit card, can I still join?

Yes of course, just send me an email at fuzzinglabs@gmail.com and we will see how to make it work.

I would prefer to have an online/onsite LIVE training experience, is it possible?

We also offer all the training on this platform in a LIVE online format upon request.
Customization of on-site/online training can also be possible for small groups of attendees and depending on the timezone. Don't hesitate to contact me by mail, the popup chat, or using this form.

For how long I get access to the course?

Any courses in the FuzzingLabs Academy come with life-time access.

Will the training be updated in the future?

Courses will be updated over time and you will receive a notification email.

I'm a student, can I have a special discount?

Yes ;) Send me a message using the chat popup and we will discuss the requirement.