Module 0: Windows Binaries, 50 / 50 (100%)
100% complete
Module 1: Dynamic Analysis, 110 / 110 (100%)
100% complete
Module 2: Tools Arsenal, 309 / 309 (100%)
100% complete
Module 3: Reverse Engineering, 708 / 708 (100%)
100% complete
Module 4: Packers & Obfuscators, 519 / 519 (100%)
100% complete
Module 5: Aniti-Malware Tricks, 507 / 507 (100%)
100% complete
Module 6: Process Injection, 585 / 585 (100%)
100% complete
Module 7: .NET Reversing, 1,427 / 1,427 (100%)
100% complete
Module 8: Dissecting Infostealers like a BOSS, 903 / 903 (100%)
100% complete
Module 9: Fighting Ransomware, 880 / 880 (100%)
100% complete
Total: 5,998 / 5,998 (100%)
Challenge Solved Points
Class 6 (Chall): Recovering Encrypted Machine (Module 9: Fighting Ransomware) Second to solve this challenge! 8 months, 21 days after release (2026-01-23 21:51:07) 200
Class 5 (Chall): Restoring Locked Keyboard (Module 9: Fighting Ransomware) Third to solve this challenge! 8 months, 20 days after release (2026-01-22 21:45:41) 130
Class 4.1 (Lab): Recovering Ryuk Files with NeZa (Module 9: Fighting Ransomware) #4, 7 months, 13 days after release (2026-01-22 21:33:11) 120
Class 4 (Lab): Reversing Ryuk Ransomware with IDA (Module 9: Fighting Ransomware) #4, 1 year, 3 months after release (2026-01-22 21:00:01) 120
Class 3 (Lab): Unhooking a locked machine with NeZa (Module 9: Fighting Ransomware) #4, 1 year, 3 months after release (2026-01-22 19:57:48) 110
Class 2 (Lab): Intercepting AES key with NeZa (Module 9: Fighting Ransomware) #4, 1 year, 3 months after release (2026-01-21 22:16:08) 100
Class 1 (Lab): Intercepting RSA key with NeZa (Module 9: Fighting Ransomware) #4, 1 year, 3 months after release (2026-01-21 21:51:22) 100
Class 5.1 (Chall): Dissecting the Plugin (Module 8: Dissecting Infostealers like a BOSS) #4, 1 year, 4 months after release (2026-01-21 21:24:40) 150
Class 5 (Chall): Dissecting Infostealer (Module 8: Dissecting Infostealers like a BOSS) #4, 1 year, 4 months after release (2026-01-20 23:16:01) 120
Class 4.1 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) #4, 7 months, 27 days after release (2026-01-20 22:45:43) 91
Class 4.2 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) #4, 7 months, 27 days after release (2026-01-20 22:44:11) 91
Class 4 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) #4, 1 year, 4 months after release (2026-01-20 22:42:31) 91
Class 3.1 (Lab): Dissecting Powershell Dropper (Module 8: Dissecting Infostealers like a BOSS) #4, 7 months, 27 days after release (2026-01-20 21:15:50) 90
Class 3 (Lab): Dissecting Powershell Dropper with NeZa (Module 8: Dissecting Infostealers like a BOSS) #4, 1 year, 4 months after release (2026-01-20 20:58:25) 90
Class 2 (Lab): Dissecting BAT Downloader (Module 8: Dissecting Infostealers like a BOSS) #4, 1 year, 3 months after release (2026-01-15 20:19:09) 90
Class 1 (Lab): Scripts 101 (Module 8: Dissecting Infostealers like a BOSS) #4, 1 year, 3 months after release (2026-01-14 22:35:16) 90
Class 4.5 (Chall): Find the Keylogger Actor (Module 7: .NET Reversing) #4, 2 months, 28 days after release (2026-01-14 22:15:39) 210
Class 4.4 (Lab): Finding & Automating the Decryption of Third Stage (Module 7: .NET Reversing) #5, 1 year, 8 months after release (2026-01-13 22:27:13) 200
Class 4.2 (Lab): Finding Second Stage Entry Point (Module 7: .NET Reversing) #5, 1 year, 8 months after release (2026-01-13 22:09:22) 115
Class 4.3 (Chall): Found the Parent (Module 7: .NET Reversing) #5, 3 months, 6 days after release (2026-01-13 22:05:23) 125
Class 4.1.2 (Lab): WinDBG SOS Update (Module 7: .NET Reversing) #4, 3 months, 2 days after release (2026-01-10 11:21:09) 112
Class 4.1 (Lab): Introducing WinDbg SOS Plugin (Module 7: .NET Reversing) #4, 1 year, 8 months after release (2026-01-10 10:55:22) 110
Class 4 (Lab): Limitations of DnSpy (Module 7: .NET Reversing) #4, 1 year, 8 months after release (2026-01-09 23:49:53) 105
Class 3 (Lab): Patching Binary for Dumping (Module 7: .NET Reversing) #5, 1 year, 8 months after release (2026-01-07 22:47:59) 100
Class 2 (Lab): Deobfuscating Stage1 from Resources (Module 7: .NET Reversing) #5, 1 year, 8 months after release (2026-01-07 22:07:09) 95
Class 1.2 (Chall) FindMethod by Name (Module 7: .NET Reversing) #5, 5 months, 12 days after release (2025-12-30 21:43:54) 90
Class 1.1 (Chall) FindMethod by ID (Module 7: .NET Reversing) #5, 5 months, 12 days after release (2025-12-30 21:29:24) 85
Class 1 (Lab): Reflection 101 (Module 7: .NET Reversing) #5, 1 year, 8 months after release (2025-12-30 21:19:32) 80
Class 5 (Chall): Intercept the Shellcode (Module 6: Process Injection) #6, 4 months, 15 days after release (2025-12-30 20:59:53) 100
Class 4 (Chall): Find the Shellcode (Module 6: Process Injection) #6, 6 months, 6 days after release (2025-12-30 20:37:12) 95
Class 3.1 (Lab): Fighting Process Injection with x32dbg (Module 6: Process Injection) Third to solve this challenge! 2 months, 13 days after release (2025-12-10 20:38:14) 85
Class 3 (Chall): Find the Window (Module 6: Process Injection) #5, 5 months, 16 days after release (2025-12-10 20:22:43) 80
Class 2.1 (Lab): SetThreadContext Technique (Module 6: Process Injection) #6, 1 year, 7 months after release (2025-12-10 20:00:58) 75
Class 2 (Lab): SetThreadContext Technique (Module 6: Process Injection) #5, 1 year, 7 months after release (2025-12-10 19:33:47) 75
Class 5 (Lab): Anti-Malware Ticks (Module 5: Aniti-Malware Tricks) #4, 1 year, 7 months after release (2025-12-09 19:08:34) 78
Class 1 (Lab): CreateRemoteThread Technique (Module 6: Process Injection) #5, 1 year, 7 months after release (2025-12-07 22:20:59) 75
Class 4.2 (Chall): Find the Offset (Module 5: Aniti-Malware Tricks) #4, 5 months, 10 days after release (2025-12-02 23:00:13) 76
Class 4.1 (Chall): Patch the Binary (Module 5: Aniti-Malware Tricks) #4, 5 months, 13 days after release (2025-12-02 22:47:51) 75
Class 4 (Lab): Anti-Debugging Ticks (Module 5: Aniti-Malware Tricks) #4, 1 year, 7 months after release (2025-12-02 22:39:32) 71
Class 3 (Brief): Process Injection (Module 5: Aniti-Malware Tricks) #5, 1 year, 7 months after release (2025-11-28 21:21:30) 70
Class 2 (Brief): Anti-VM and Packers (Module 5: Aniti-Malware Tricks) #5, 1 year, 9 months after release (2025-11-28 21:02:37) 69
Class 1 (Brief): Anti-Debugging (Module 5: Aniti-Malware Tricks) #5, 1 year, 9 months after release (2025-11-28 20:45:08) 68
Class 6 (Chall): G0T Password? (Module 3: Reverse Engineering) #4, 6 months, 4 days after release (2025-11-27 20:11:28) 75
Class 5 (Lab): Find the Password (Module 3: Reverse Engineering) #4, 1 year, 7 months after release (2025-11-27 20:10:17) 67
Class 5.1 (Lab): Find the Password (Module 3: Reverse Engineering) #4, 1 year, 7 months after release (2025-11-27 19:48:41) 68
Class 4.2 (Chall): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #4, 6 months, 4 days after release (2025-11-27 19:38:03) 66
Class 4.1 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #4, 1 year, 7 months after release (2025-11-27 19:13:31) 65
Class 4 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #4, 1 year, 7 months after release (2025-11-26 23:07:26) 65
Class 3.2 (Chall): Calling Conventions (Module 3: Reverse Engineering) #5, 6 months, 3 days after release (2025-11-26 20:59:38) 61
Class 5 (Chall): Unpacking UPX your way (Module 4: Packers & Obfuscators) #5, 6 months, 3 days after release (2025-11-26 20:36:41) 65
Class 3.1 (Chall): Calling Conventions (Module 3: Reverse Engineering) #6, 6 months, 2 days after release (2025-11-25 22:31:05) 61
Class 3 (Brief): Calling Conventions (Module 3: Reverse Engineering) #6, 1 year, 9 months after release (2025-11-25 22:30:52) 60
Class 6 (Chall): Unpacking for Flag (Module 4: Packers & Obfuscators) #4, 6 months, 2 days after release (2025-11-25 21:37:19) 75
Class 2 (Brief): Assembly Operands (Module 3: Reverse Engineering) #6, 1 year, 9 months after release (2025-11-24 22:41:46) 60
Class 1 (Brief): Disassembler Process (Module 3: Reverse Engineering) #7, 1 year, 9 months after release (2025-11-24 20:37:52) 60
Class 4.2 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #6, 6 months after release (2025-11-23 16:48:32) 57
Class 4.1 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #6, 1 year, 7 months after release (2025-11-23 16:27:02) 56
Class 4 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #6, 1 year, 7 months after release (2025-11-23 16:00:57) 56
Class 3 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #6, 1 year, 7 months after release (2025-11-22 13:07:44) 55
Class 3.1 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #6, 1 year, 7 months after release (2025-11-22 13:00:11) 55
Class 5 (Lab): Wireshark 101 (Module 2: Tools Arsenal) #7, 6 months, 18 days after release (2025-11-19 22:39:54) 46
Class 2 (Brief):Unpacking & Deobfuscation Strategy (Module 4: Packers & Obfuscators) #6, 1 year, 9 months after release (2025-11-19 21:38:42) 50
Class 1 (Brief): Carnita Methodology (Module 4: Packers & Obfuscators) #7, 1 year, 9 months after release (2025-11-19 21:23:17) 50
Class 3 (Chall): PE Editors Exercise (Module 2: Tools Arsenal) #7, 1 year, 7 months after release (2025-11-18 19:59:50) 30
Class 5.1 (Lab): Fakenet 101 (Module 2: Tools Arsenal) #7, 6 months, 15 days after release (2025-11-17 07:15:15) 46
Class 5.2 (Lab): Inetsim 101 (Module 2: Tools Arsenal) #6, 6 months, 15 days after release (2025-11-17 07:11:32) 46
Class 4.1 (Chall): Debuggers & Disassemblers (Module 2: Tools Arsenal) #8, 5 months, 22 days after release (2025-11-15 19:49:01) 41
Class 4 (Lab): Debuggers & Disassemblers (Module 2: Tools Arsenal) #8, 1 year, 7 months after release (2025-11-15 19:47:51) 40
Class 2 (Brief): WinDbg, IDA Pro & Qilinq (Module 2: Tools Arsenal) #7, 1 year, 7 months after release (2025-11-02 22:18:48) 30
Class 1 (Brief): PE Editors & Process Explorer (Module 2: Tools Arsenal) #7, 1 year, 7 months after release (2025-10-28 22:59:10) 30
Class 4 (Lab): Analysis Inside a Virtual Machine (Module 1: Dynamic Analysis) #7, 1 year, 6 months after release (2025-10-26 13:25:07) 20
Class 5 (Brief): Process and Network Monitoring (Module 1: Dynamic Analysis) #8, 6 months, 13 days after release (2025-10-25 21:53:48) 30
Class 3 (Lab): Sandbox Analysis (Module 1: Dynamic Analysis) #8, 1 year, 6 months after release (2025-10-23 21:37:27) 20
Class 2 (Brief): Analysis Lab & Tools (Module 1: Dynamic Analysis) #8, 1 year, 8 months after release (2025-10-23 21:35:35) 20
Class 5 (Lab): Windows Binaries Example (Module 0: Windows Binaries) #9, 1 year, 6 months after release (2025-10-22 21:28:52) 10
Class 1 (Brief): Malicious Software 101 (Module 1: Dynamic Analysis) #8, 1 year, 8 months after release (2025-10-21 18:27:02) 20
Class 4 (Brief): .NET Assemblies (Module 0: Windows Binaries) #10, 1 year, 8 months after release (2025-10-20 18:37:03) 10
Class 3 (Brief): Windows Loader (Module 0: Windows Binaries) #11, 1 year, 8 months after release (2025-10-20 18:27:34) 10
Class 2 (Brief): Windows Executables Format (Module 0: Windows Binaries) #11, 1 year, 7 months after release (2025-10-18 12:44:35) 10
Class 1 (Brief): Compiling & Building Executables (Module 0: Windows Binaries) #12, 1 year, 6 months after release (2025-10-18 12:20:37) 10