- Dissecting Go Binaries
- Go: Overview of the Compiler
- Go compiler internals: adding a new statement to Go - Part 1
- Go compiler internals: adding a new statement to Go - Part 2
- Reversing GO binaries like a pro
- How a Go Program Compiles down to Machine Code
- Analyzing Golang Executables
- Go Reverse Engineering Tool Kit
- go-internals book
- Reconstructing Program Semantics from Go Binaries
- The Go low-level calling convention on x86-64
- Golang Internals (1 of 6)
- Go Series by Joakim Kennedy
I add some of my resources:
https://pkg.go.dev/ -> goroutine functions refer here https://www.sentinelone.com/labs/alphagolang-a-step-by-step-go-malware-reversing-methodology-for-ida-pro/ https://cujo.com/reverse-engineering-go-binaries-with-ghidra/ https://www.youtube.com/watch?v=wWNbnEp_4ZE - Anatomy of a Gopher: Binary Analysis of Go Binaries w/ Alex Useche - SANS HackFest Summit 2020 https://www.youtube.com/watch?v=J2svN8h21oo - Reversing GO Binaries With Ghidra - Albert Zsigovits and Dorka Palotay https://www.youtube.com/watch?v=_cL-OwU9pFQ - Reversing in action: Golang malware used in the SolarWinds attack. Part 1 https://medium.com/@nishanmaharjan17/reversing-golang-binaries-part-1-c273b2ca5333 https://medium.com/@nishanmaharjan17/reversing-golang-binaries-part-2-26f522264d01 https://medium.com/@nishanmaharjan17/reversing-golang-binaries-part-3-how-to-run-a-golang-ransomware-613f5369cbaa https://blog.osiris.cyber.nyu.edu/2019/12/19/go-deepdive/