<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-05-05T02:23:00Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by Decoder Loop</title>
  <author>
    <name>Decoder Loop</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub1pts8enln670teg44ywhjvhdaah0yy2ngf4lf87lgu3srnfxmgq7q7rj2cp.rss" />
  <link href="https://yabu.me/npub1pts8enln670teg44ywhjvhdaah0yy2ngf4lf87lgu3srnfxmgq7q7rj2cp" />
  <id>https://yabu.me/npub1pts8enln670teg44ywhjvhdaah0yy2ngf4lf87lgu3srnfxmgq7q7rj2cp</id>
  <icon>https://media.infosec.exchange/infosec.exchange/accounts/avatars/115/246/657/945/935/565/original/531085ee9bceb50b.png</icon>
  <logo>https://media.infosec.exchange/infosec.exchange/accounts/avatars/115/246/657/945/935/565/original/531085ee9bceb50b.png</logo>




  <entry>
    <id>https://yabu.me/nevent1qqsya02nadrfn0h45ptttsuxugfu7aecq7d74va93yh6atjqwn3zk9szyq9wqlx070tea09zk5367fjahhkaus32dpxhaylmarjxqwdymdqrcqrhrxy</id>
    
      <title type="html">📣🦀 We&amp;#39;re very excited to announce TWO sessions for our ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsya02nadrfn0h45ptttsuxugfu7aecq7d74va93yh6atjqwn3zk9szyq9wqlx070tea09zk5367fjahhkaus32dpxhaylmarjxqwdymdqrcqrhrxy" />
    <content type="html">
      📣🦀 We&amp;#39;re very excited to announce TWO sessions for our flagship Rust reverse engineering course, Deconstructing Rust Binaries, coming to you in early 2026!&lt;br/&gt;&lt;br/&gt;1) Deconstructing Rust Binaries at &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1hzefzca53sw9edwqq23pykf67fagr2mvwshvvkce5n794k5tgamssxwh5p&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Ringzer0&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1hze…wh5p&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; COUNTERMEASURE, March 23-26 2026, 16 hours, Remote: &lt;a href=&#34;https://ringzer0.training/countermeasure-spring-2026-deconstructing-rust-binaries/&#34;&gt;https://ringzer0.training/countermeasure-spring-2026-deconstructing-rust-binaries/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;2) Deconstructing Rust Binaries at &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1pfejuvldyncl5ymhvx6hal5sw926ccnj6yqnrjqeu8lu2nhx02ssfr2u6v&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;NorthSec&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1pfe…2u6v&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;, May 11-13 2026, 24 hours, Onsite in Montréal, Canada and Remote: &lt;a href=&#34;https://nsec.io/training/2026-deconstructing-rust-binaries/&#34;&gt;https://nsec.io/training/2026-deconstructing-rust-binaries/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Deconstructing Rust Binaries is the first comprehensive training course focused _solely_ on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practical upskill in your ability to analyze Rust binaries. You will learn how to effectively triage Rust binaries, how to trace data flow through Rust binaries, and how to tackle common techniques found in the Rust malware ecosystem.&lt;br/&gt;&lt;br/&gt;This course is taught and written by an experienced malware reverse engineer, &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub16w7es466p8mme07g4d9d3kgq5pgnf79dl5ymtvm5jmsp4v5x5a8sysg7ce&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Cindʎ Xiao 🍉&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub16w7…g7ce&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;, with extensive experience specifically in reversing Rust binaries. Want a preview of the technical expertise we offer? Check out the 120&#43; FREE slides on Rust reversing from our recent workshop, &amp;#34;Reversing a (Not-so-Simple) Rust Loader&amp;#34;! &lt;a href=&#34;https://github.com/decoderloop/2025-11-07-ringzer0-countermeasure-not-so-simple-rust-loader-workshop/&#34;&gt;https://github.com/decoderloop/2025-11-07-ringzer0-countermeasure-not-so-simple-rust-loader-workshop/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A few key things about the course:&lt;br/&gt;&lt;br/&gt;1) No previous experience with reversing Rust binaries, or writing Rust code, is required!&lt;br/&gt;2) The course will use Binary Ninja as the primary reverse engineering tool. You will be provided a Binary Ninja student license as part of the course.&lt;br/&gt;3) We&amp;#39;re excited to offer flexibility in the training format and course depth. You have the choice of either taking:&lt;br/&gt;&lt;br/&gt;a) A fully remote, 4 hour per day, shorter class at Ringzer0 (&lt;a href=&#34;https://ringzer0.training/countermeasure-spring-2026-deconstructing-rust-binaries/&#34;&gt;https://ringzer0.training/countermeasure-spring-2026-deconstructing-rust-binaries/&lt;/a&gt;)&lt;br/&gt;b) A remote or onsite, 8 hour per day, comprehensive class at NorthSec (&lt;a href=&#34;https://nsec.io/training/2026-deconstructing-rust-binaries/&#34;&gt;https://nsec.io/training/2026-deconstructing-rust-binaries/&lt;/a&gt;)&lt;br/&gt;&lt;br/&gt;We look forward to seeing you in 2026!&lt;br/&gt;&lt;br/&gt;#infosec #InfosecTraining #malware #MalwareAnalysis #ReverseEngineering #reversing #rust #rustlang #binaryninja #NorthSec #ringzer0 #Ringzer0Training
    </content>
    <updated>2025-12-19T15:00:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw2dpsyexcdjekzwa0hexx9gwa4ej97q2hf93hz04wjjq3yf2xzzszyq9wqlx070tea09zk5367fjahhkaus32dpxhaylmarjxqwdymdqrcpgyftr</id>
    
      <title type="html">🦀 Looking for Rust malware samples to practice analyzing? Our ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw2dpsyexcdjekzwa0hexx9gwa4ej97q2hf93hz04wjjq3yf2xzzszyq9wqlx070tea09zk5367fjahhkaus32dpxhaylmarjxqwdymdqrcpgyftr" />
    <content type="html">
      🦀 Looking for Rust malware samples to practice analyzing? Our Rust Malware Sample Gallery just received a major update, with 20 new families added! &lt;a href=&#34;https://github.com/decoderloop/rust-malware-gallery&#34;&gt;https://github.com/decoderloop/rust-malware-gallery&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;The Sample Gallery collects links to articles about malware written in Rust, organizes them by malware family, and includes a download link to a publicly available sample for every malware family. This is a resource for any malware analyst who wants to get hands-on with real Rust malware.&lt;br/&gt;&lt;br/&gt;The last time the Sample Gallery was updated was almost 2 years ago, in January 2024. Since then, there&amp;#39;s been an explosive growth in new Rust malware, including all of the following families that are now in the Sample Gallery:&lt;br/&gt;&lt;br/&gt;SPICA, KrustyLoader, RustDoor, SSLoad, Fickle Stealer, Cicada3301 Ransomware, RustyClaw, Embargo Ransomware, RustyAttr, Akira Ransomware (both the Akira_v2 and Megazord variants), Banshee (Rust variant), RALord Ransomware, RustoBot, Tetra Loader, EDDIESTEALER, Myth Stealer, Rustonotto, RustyPages, ChaosBot&lt;br/&gt;&lt;br/&gt;This is nearly one new Rust malware family observed in the wild, every month. Rust as a programming language for malware is here to stay!&lt;br/&gt;&lt;br/&gt;#rust #rustlang #malware #infosec #ReverseEngineering #MalwareAnalysis #reversing
    </content>
    <updated>2025-12-15T15:02:02Z</updated>
  </entry>

</feed>