Skip to content

decoderloop/2025-11-07-ringzer0-countermeasure-not-so-simple-rust-loader-workshop

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

Workshop: Reversing a (not-so-) Simple Rust Loader - Ringzer0 COUNTERMEASURE 2025

Materials for the workshop Reversing a (not-so-) Simple Rust Loader at Ringzer0 COUNTERMEASURE, conducted by Cindy Xiao on 2025-11-07 in Ottawa, Canada.

Pre-workshop prep

Materials

  • Slides: PDF slides are available in slides/.
  • Binary Ninja Database: A Binary Ninja Database with full annotations for the sample is available in bndbs/

Check out the Tags in the database for key locations in the binary, and the History in the database for a step-by-step walkthrough of how we marked up the binary.

A screenshot of the Tags window in the software Binary Ninja, showing a list of bookmarked locations in a Rust binary. A screenshot of the History window in the software Binary Ninja, showing a step by step list of variable definition, variable rename, and comment annotations made in a binary. An annotation of a decompiled version of the Rust standard library std::sys::pal::windows::thread::Thread::new::thread_start function, showing an indirect call, via a virtual function table (vtable), to the function call_once.

Additional Rust Resources

These Rust resources are not in the slides, but were mentioned during the live version of the workshop:

About

Slides and materials for the workshop "Reversing a (not-so-) Simple Rust Loader" at Ringzer0 COUNTERMEASURE 2025.

Topics

Resources

Stars

Watchers

Forks