top of page





4 days


Online / Offline 


Intermediate / Advanced 

Arnau Gàmez i Montolio


Arnau Gàmez i Montolio

About the training: 

Arnau Gàmez i Montolio  is a Catalan hacker, security researcher and mathematician, specialized in software security and reverse engineering. He has an extensive research background in software protection, code obfuscation, deobfuscation, and mixed boolean-arithmetic algebra, along with a vast industry experience as a software developer, malware analyst and security engineer for several organizations.

Arnau is a founder of Fura Labs, a research & education firm on software security and reverse engineering as well as a co-founder and president of HackingLliure, a non-profit association and hacking community.

Arnau is also a regular speaker and trainer at international events and security conferences like RingZer0, HITB, RuhrSec, r2con, etc.

Code obfuscation has become one of the most prevalent mechanisms aiming to complicate the process of software reverse engineering. It plays a major role on a wide range of domains: from malware threats to protection of intellectual property and digital rights management.

An Analytical approach to Modern Binary Deobfuscation is a curated training that provides an intensive jump-start into the field of code (de)obfuscation. Over the course of this training, students will receive a comprehensive introduction to the most relevant software obfuscation mechanisms as well as existing deobfuscation techniques to analyze, confront and defeat obfuscated code.

Key learning objectives:

  • Obtain a high-level overview of the context and scenarios where code obfuscation is used

  • Gain an in-depth understanding of code obfuscation mechanisms

  • Build obfuscated code, both from scratch and through available tooling

  • Develop an understanding of the main code deobfuscation techniques

  • Learn tooling for analyzing obfuscated code and apply deobfuscation techniques

  • Become familiar with state of the art (de)obfuscation research literature

Teaching methodology:
Live classes are designed to be dynamic and engaging, making the students get the most out of the training materials and instructor expertise. A clear presentation of the concepts, accompanied by illustrative examples and demos. For each section, there will be practice time allocated. The students will be provided with several exercises to work on, with the continuous support of the instructor.


  • Understanding of basic programming concepts

  • Familiarity with x86 assembly, C and Python

  • Knowledge of reverse engineering fundamentals

System requirements:

  • A working desktop/laptop capable of running virtual machines

  • 40 GB free hard disk space

Provided to students:

  • Access to a VM with all tools, examples and exercises

  • Access to a private chat with instructor and other students

What students get after the training:

  • itrainsec shareable certificate, signed by the trainer (add it to your LinkedIn profile) 

  • Course materials 

  • Practical skill to elevate career to the next level 

  • After-training consultancy and support 

  • Expansion of professional network in the cybersecurity industry 

  • Stronger cybersecurity posture of their business

bottom of page