VulnCheck Exploit Developer and Vulnerability Researcher Jonathan Peterson will be presenting “Portable Deserialization Payloads Using Go” at Wild West Hackin’ Fest 2026 on February 12, 2026, from 11:05 - 11:30 a.m. MT in the Colorado Ballroom (Track 1).
If you’re tired of spinning up VMs, installing Java, or pasting ugly gadget blobs into your serialization exploits, this talk is for you.
This session introduces a new open-source, Go-based deserialization gadget generation library from VulnCheck. The library leverages Go’s cross-platform strengths to generate Java and .NET deserialization gadgets from any operating system, all without requiring Windows or Java.
Jonathan will walk through how to use the library both programmatically and via a new companion CLI tool, which will be released during the talk and allows attendees to generate payloads directly from the terminal.
Join Jonathan live at Wild West Hackin’ Fest, or watch virtually by registering for Wild West Hackin’ Fest and tuning into the Track 1 Thursday AM Livestream.

About Speaker | Jonathan Peterson, Exploit Developer | Vuln Researcher, VulnCheck
Based in Colorado, Jonathan Person (@lobsterjerusalem/@deadjakk) has been in the security industry for over 10 years, working primarily as a penetration tester and security researcher.
Currently, an exploit developer for VulnCheck’s Initial Access Team, Jonathan spends his days creating and weaponizing exploits while also discovering new vulnerabilities for products that span from simple Github projects to IoT devices to full enterprise software suites.