<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
    <title>Wisp Security GmbH</title>
    <subtitle>Professional penetration testing and offensive security development for companies in Germany.</subtitle>
    <link rel="self" type="application/atom+xml" href="https://wisp-security.eu/en/atom.xml"/>
    <link rel="alternate" type="text/html" href="https://wisp-security.eu"/>
    <generator uri="https://www.getzola.org/">Zola</generator>
    <updated>2026-03-31T00:00:00+00:00</updated>
    <id>https://wisp-security.eu/en/atom.xml</id>
    <entry xml:lang="en">
        <title>Botconf 2026: Ghidra workshop on symbol recovery and Golang malware</title>
        <published>2026-03-31T00:00:00+00:00</published>
        <updated>2026-03-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            Ben Stuart
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://wisp-security.eu/en/blog/2026-03-botconf-ghidra-workshop/"/>
        <id>https://wisp-security.eu/en/blog/2026-03-botconf-ghidra-workshop/</id>
        
        <content type="html" xml:base="https://wisp-security.eu/en/blog/2026-03-botconf-ghidra-workshop/">&lt;p&gt;We are pleased to attend &lt;a href=&quot;https:&#x2F;&#x2F;www.botconf.eu&#x2F;&quot;&gt;Botconf 2026&lt;&#x2F;a&gt; in Reims, France. The main conference runs from 15 to 17 April 2026; workshops take place on 14 April 2026. The conference focuses on botnets and malware ecosystems.&lt;&#x2F;p&gt;
&lt;p&gt;Alongside the programme we will join the workshop “Malware symbol recovery with Ghidra using Golang examples”. It covers how to work faster when unnamed functions pile up: restoring function symbols and automating rename steps when hundreds or thousands of unknown symbols get in the way. Examples use Golang because statically linked Go binaries illustrate the ideas well.&lt;&#x2F;p&gt;
&lt;p&gt;In the four-hour workshop we work through two malware families seen in the wild: how symbol recovery works in theory and how to apply it in Ghidra. That includes building your own symbol databases and using privately analysed samples as a starting point for further research into family evolution. The relationship between source and compiled code (especially with Go) is also clarified.&lt;&#x2F;p&gt;
&lt;p&gt;The techniques apply to any binary Ghidra supports and can be adapted for other tools with minor changes.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;em&gt;Note: We will extend this post with impressions and follow-up notes after the visit.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
</content>
        
    </entry>
</feed>
