BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsides-exeter-2026//speaker//D3ALRU
BEGIN:VTIMEZONE
TZID:GMT
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:GMT
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T020000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:BST
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsides-exeter-2026-3H7ZAT@pretalx.com
DTSTART;TZID=GMT:20260425T094500
DTEND;TZID=GMT:20260425T102500
DESCRIPTION:Reverse engineering Go binaries can be difficult\, especially u
 sing  existing dynamic tools to interrogate program state at runtime. This
  talk explains how metadata in Go binaries can be used to recover data typ
 e definitions\, then combined with a debugger at runtime to display the co
 ntents of complex data structures such as arrays and custom structs\, even
  on stripped binaries.\n\nThese techniques are demonstrated in a recent re
 lease of LLEF\, which is a free and open reverse engineering toolkit for L
 LDB developed by Foundry Zero.
DTSTAMP:20260501T070548Z
LOCATION:Seminar Room 7
SUMMARY:Unlocking the secrets of stripped Go binaries at runtime - Alex M
URL:https://pretalx.com/bsides-exeter-2026/talk/3H7ZAT/
END:VEVENT
END:VCALENDAR
