Trending
Decoder Loop's Avatar

Decoder Loop

@decoderloop.com

Rust Reverse Engineering Training. Modern programming languages require modern reverse engineers. 🌐 https://decoderloop.com πŸ’» https://github.com/decoderloop 🐘 https://infosec.exchange/@decoderloop πŸ’Ό https://linkedin.com/company/decoderloop/

14
Followers
11
Following
23
Posts
19.05.2025
Joined
Posts Following

Latest posts by Decoder Loop @decoderloop.com

Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practical…

Last day before prices go up for Deconstructing Rust Binaries at Ringzer0, March 23-26! If you've been thinking about this fully remote, 16-hour Rust reverse engineering training: now is the time to book!

ringzer0.training/countermeasu...

#infosec #ReverseEngineering #rustlang #MalwareAnalysis

07.03.2026 21:14 πŸ‘ 4 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practical…

Deconstructing Rust Binaries @ Ringzer0 is 16 hours of fully remote training, 4 hours each day x 4 days, March 23-26. Prices go up March 8, so reserve your spot now!

ringzer0.training/countermeasu...

#MalwareAnalysis #Rust #RustLang #ReverseEngineering #Reversing #Infosec

25.02.2026 14:00 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practical…

Just a few weeks left until our training, Deconstructing Rust Binaries, starting March 23 at Ringzer0! This course is for any reverse engineer who needs real techniques for reversing Rust binaries.

ringzer0.training/countermeasu...

#MalwareAnalysis #RustLang #ReverseEngineering #Reversing

25.02.2026 14:00 πŸ‘ 0 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

Come check out our Deconstructing Rust Binaries training at NorthSec (or remote) this year! Three whole days of Rust reversing.

09.02.2026 19:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - decoderloop/rust-malware-gallery: A collection of malware families and malware samples which use the Rust programming language. A collection of malware families and malware samples which use the Rust programming language. - decoderloop/rust-malware-gallery

RustyWater (aka RUSTRIC, Archer RAT) has been added to the Rust Malware Sample Gallery: github.com/decoderloop/...

#rust #rustlang #malware #infosec #ReverseEngineering #MalwareAnalysis #reversing #MuddyWater

10.01.2026 20:15 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - decoderloop/rust-malware-gallery: A collection of malware families and malware samples which use the Rust programming language. A collection of malware families and malware samples which use the Rust programming language. - decoderloop/rust-malware-gallery

FunkSec Ransomware (aka FunkLocker) has been added to the Rust Malware Sample Gallery: github.com/decoderloop/...

#rust #rustlang #malware #infosec #ReverseEngineering #MalwareAnalysis #reversing #ransomware #FunkSec #FunkLocker

08.01.2026 17:09 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Preview
GitHub - decoderloop/rust-malware-gallery: A collection of malware families and malware samples which use the Rust programming language. A collection of malware families and malware samples which use the Rust programming language. - decoderloop/rust-malware-gallery

A new Rust DDoS Botnet family has been added to the Rust Malware Sample Gallery: github.com/decoderloop/...

This family is unnamed, but was analyzed in this article by Beelzebub: beelzebub.ai/blog/rust-dd...

#rust #rustlang #malware #infosec #ReverseEngineering #MalwareAnalysis #reversing #botnet

08.01.2026 17:08 πŸ‘ 0 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Preview
GitHub - decoderloop/rust-malware-gallery: A collection of malware families and malware samples which use the Rust programming language. A collection of malware families and malware samples which use the Rust programming language. - decoderloop/rust-malware-gallery

The Rust ransomware KCVY OSLOCK has been added to the Rust Malware Sample Gallery: github.com/decoderloop/...

#rust #rustlang #malware #infosec #ReverseEngineering #MalwareAnalysis #reversing #ransomware

02.01.2026 07:54 πŸ‘ 2 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Preview
Decoder Loop | Reverse Engineering Training Decoder Loop | Reverse Engineering Training

To keep up to date with all of our training dates and events, visit our website: decoderloop.com#upcoming-tra...

We look forward to seeing you in 2026!

19.12.2025 15:09 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Deconstructing Rust Binaries

We're also excited to offer flexibility in the training format and course depth. You have the choice of either:

1) A remote or onsite, 8 hour / day, comprehensive class at NorthSec: nsec.io/training/202...
2) A fully remote, 4 hour / day, shorter class at Ringzer0: ringzer0.training/countermeasu...

19.12.2025 15:09 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

A few key things about Deconstructing Rust Binaries:

1) No previous experience with reversing Rust binaries, or writing Rust code, is required!

2) The course will use Binary Ninja as the primary reverse engineering tool. You will be provided a Binary Ninja student license as part of the course!

19.12.2025 15:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
GitHub - decoderloop/2025-11-07-ringzer0-countermeasure-not-so-simple-rust-loader-workshop: Slides and materials for the workshop "Reversing a (not-so-) Simple Rust Loader" at Ringzer0 COUNTERMEASURE ... Slides and materials for the workshop "Reversing a (not-so-) Simple Rust Loader" at Ringzer0 COUNTERMEASURE 2025. - decoderloop/2025-11-07-ringzer0-countermeasure-not-so-simple-rust-loade...

This course is taught by a reverse engineer, @cxiao.net, with extensive experience specifically in reversing Rust malware.

Want a preview of our expertise? Check out the 120+ FREE slides on Rust RE from our recent workshop, Reversing a (Not-so-Simple) Rust Loader! github.com/decoderloop/...

19.12.2025 15:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Deconstructing Rust Binaries is the first comprehensive course focused *solely* on reverse engineering Rust binaries. You will learn how to effectively triage Rust binaries, how to trace data flow through Rust binaries, and how to tackle common techniques found in the Rust malware ecosystem.

19.12.2025 15:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practical upskil...

πŸ“£πŸ¦€ Announcing: TWO 2026 sessions for our Rust reverse engineering course, Deconstructing Rust Binaries!

1) Ringzer0 COUNTERMEASURE, March 23-26, Remote: ringzer0.training/countermeasu...

2) NorthSec (@nsec.io), May 11-13, MontrΓ©al & Remote: nsec.io/training/202...

#malware #infosec #rustlang

19.12.2025 15:08 πŸ‘ 5 πŸ” 1 πŸ’¬ 1 πŸ“Œ 1

Excited to bring Deconstructing Rust Binaries to NorthSec in March! Chat with me here or at @decoderloop.com if you have questions about the training.

Take advantage of the early bird rate for the onsite option! Pricing is in CAD, take advantage of the exchange rate (:

nsec.io/training/202...

18.12.2025 22:13 πŸ‘ 5 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

...RustyAttr, Akira Ransomware (both Akira_v2 and Megazord), Banshee (Rust variant), RALord Ransomware, RustoBot, Tetra Loader, EDDIESTEALER, Myth Stealer, Rustonotto, RustyPages, ChaosBot

This is ~1 new Rust malware family per month. Rust as a programming language for malware is here to stay!

15.12.2025 15:42 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The last time the Sample Gallery was updated was in January 2024 (~2 years ago). Since then, there's been an explosive growth in new Rust malware, including:

SPICA, KrustyLoader, RustDoor, SSLoad, Fickle Stealer, Cicada3301 Ransomware, RustyClaw, Embargo Ransomware,

(cont'd - there's too many!)

15.12.2025 15:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
GitHub - decoderloop/rust-malware-gallery: A collection of malware families and malware samples which use the Rust programming language. A collection of malware families and malware samples which use the Rust programming language. - decoderloop/rust-malware-gallery

The Sample Gallery collects links to articles about malware written in Rust, organizes them by family, and includes a download link to a publicly available sample for every malware family. This is for any malware analyst who wants to get hands-on with real Rust malware.

github.com/decoderloop/...

15.12.2025 15:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
GitHub - decoderloop/rust-malware-gallery: A collection of malware families and malware samples which use the Rust programming language. A collection of malware families and malware samples which use the Rust programming language. - decoderloop/rust-malware-gallery

πŸ¦€ Looking for Rust malware samples to practice analyzing? Our Rust Malware Sample Gallery just received a major update, with 20 new families added! github.com/decoderloop/...

#rust #rustlang #malware #infosec #ReverseEngineering #MalwareAnalysis #reversing

15.12.2025 15:41 πŸ‘ 4 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0
A screenshot of the Tags window in the software Binary Ninja, showing a list of bookmarked locations in a Rust binary.

A screenshot of the Tags window in the software Binary Ninja, showing a list of bookmarked locations in a Rust binary.

A screenshot of the History window in the software Binary Ninja, showing a step by step list of variable definition, variable rename, and comment annotations made in a binary.

A screenshot of the History window in the software Binary Ninja, showing a step by step list of variable definition, variable rename, and comment annotations made in a binary.

An annotation of a decompiled version of the Rust standard library std::sys::pal::windows::thread::Thread::new::thread_start function, showing an indirect call, via a virtual function table (vtable), to the function call_once.

An annotation of a decompiled version of the Rust standard library std::sys::pal::windows::thread::Thread::new::thread_start function, showing an indirect call, via a virtual function table (vtable), to the function call_once.

In addition to the slides, the materials include an annotated @binary.ninja database file! Check out the Tags in the database for key locations in the binary, and the History in the database for a step-by-step walkthrough of how we marked up the binary.

github.com/decoderloop/...

07.11.2025 21:07 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - decoderloop/2025-11-07-ringzer0-countermeasure-not-so-simple-rust-loader-workshop: Slides and materials for the workshop "Reversing a (not-so-) Simple Rust Loader" at Ringzer0 COUNTERMEASURE ... Slides and materials for the workshop "Reversing a (not-so-) Simple Rust Loader" at Ringzer0 COUNTERMEASURE 2025. - decoderloop/2025-11-07-ringzer0-countermeasure-not-so-simple-rust-loade...

The slides and materials from @cxiao.net's "Reversing a (not-so-) Simple Rust Loader" workshop at Ringzer0 COUNTERMEASURE today are now available! github.com/decoderloop/...

#rustlang #ReverseEngineering #MalwareAnalysis #infosec #reversing #malware #binaryninja #COUNTERMEASURE25 #ringzer0

07.11.2025 21:05 πŸ‘ 2 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Preview
Contact Contact information for Decoder Loop

The workshop will be conducted with @binaryninja.bsky.social, so this is also a great chance to get familiar with Binary Ninja!

See you there! For more information about upcoming workshops and trainings, keep an eye on this account or sign up on our mailing list: decoderloop.com/contact/#tra...

03.11.2025 15:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

By the end of this workshop, you should know where to get more information about Rust structures and types, know a few tricks for finding interesting landmarks in Rust binaries, and be much more confident in approaching Rust binaries!

#rustlang #MalwareAnalysis #ReverseEngineering #infosec

03.11.2025 15:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
WORKSHOP: Reversing a (not-so-) Simple Rust Loader // Cindy Xiao Rust can be challenging for even experienced reverse engineers. We will reverse a simple Rust malware loader found in the wild with obfuscated strings and a decoy payload, making it a good example for...

Thank you for your interest in Decoder Loop & #rustlang reverse engineering training so far!

This Friday, November 7th, join us at Ringzer0 COUNTERMEASURE, in Ottawa, Canada, where @cxiao.net will present the workshop "Reversing a (not-so-) Simple Rust Loader": ringzer0.training/countermeasu...

03.11.2025 15:30 πŸ‘ 2 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0
Preview
Decoder Loop | Reverse Engineering Training Decoder Loop | Reverse Engineering Training

πŸ¦€ I am starting a training firm, @decoderloop.com, focused on providing Rust Reverse Engineering training! decoderloop.com

We hope to come to a conference near you next year. Stay notified on training dates: Follow us at @decoderloop.com, or join our mailing list: decoderloop.com/contact/#tra...

17.10.2025 14:09 πŸ‘ 7 πŸ” 5 πŸ’¬ 1 πŸ“Œ 0
Preview
Decoder Loop | Reverse Engineering Training Decoder Loop | Reverse Engineering Training

The amazing @cxiao.net is offering training at decoderloop.com for
#Rust #Malware #ReverseEngineering 😱
Her insight is absolutely priceless, she's taught me all I know about this. If you are organizing an event: This is the state-of-the-art training you are looking for.

17.10.2025 06:32 πŸ‘ 6 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0