Module 0: Windows Binaries, 50 / 50 (100%)
100% complete
Module 1: Dynamic Analysis, 110 / 110 (100%)
100% complete
Module 2: Tools Arsenal, 309 / 309 (100%)
100% complete
Module 3: Reverse Engineering, 708 / 708 (100%)
100% complete
Module 4: Packers & Obfuscators, 519 / 519 (100%)
100% complete
Module 5: Aniti-Malware Tricks, 507 / 507 (100%)
100% complete
Module 6: Process Injection, 585 / 585 (100%)
100% complete
Module 7: .NET Reversing, 1,217 / 1,427 (85%)
85.283812193413% complete
Module 8: Dissecting Infostealers like a BOSS, 0 / 903 (0%)
0% complete
Module 9: Fighting Ransomware, 0 / 880 (0%)
0% complete
Total: 4,005 / 5,998 (66.8%)
Challenge Solved Points
Class 4.4 (Lab): Finding & Automating the Decryption of Third Stage (Module 7: .NET Reversing) #4, 1 year, 8 months after release (2026-01-13 07:47:59) 200
Class 4.3 (Chall): Found the Parent (Module 7: .NET Reversing) #4, 3 months, 5 days after release (2026-01-13 00:47:13) 125
Class 4.2 (Lab): Finding Second Stage Entry Point (Module 7: .NET Reversing) #4, 1 year, 8 months after release (2026-01-13 00:44:16) 115
Class 4.1.2 (Lab): WinDBG SOS Update (Module 7: .NET Reversing) #5, 3 months, 5 days after release (2026-01-12 21:50:00) 112
Class 4.1 (Lab): Introducing WinDbg SOS Plugin (Module 7: .NET Reversing) #5, 1 year, 8 months after release (2026-01-12 21:48:18) 110
Class 4 (Lab): Limitations of DnSpy (Module 7: .NET Reversing) #5, 1 year, 8 months after release (2026-01-11 21:45:11) 105
Class 3 (Lab): Patching Binary for Dumping (Module 7: .NET Reversing) #6, 1 year, 8 months after release (2026-01-11 21:43:51) 100
Class 2 (Lab): Deobfuscating Stage1 from Resources (Module 7: .NET Reversing) #6, 1 year, 8 months after release (2026-01-11 20:21:07) 95
Class 1.2 (Chall) FindMethod by Name (Module 7: .NET Reversing) #6, 5 months, 24 days after release (2026-01-11 20:03:36) 90
Class 1.1 (Chall) FindMethod by ID (Module 7: .NET Reversing) #6, 5 months, 24 days after release (2026-01-11 20:01:00) 85
Class 1 (Lab): Reflection 101 (Module 7: .NET Reversing) #6, 1 year, 8 months after release (2026-01-11 19:54:40) 80
Class 5 (Chall): Intercept the Shellcode (Module 6: Process Injection) #7, 4 months, 27 days after release (2026-01-11 19:09:44) 100
Class 4 (Chall): Find the Shellcode (Module 6: Process Injection) #7, 6 months, 18 days after release (2026-01-11 18:58:02) 95
Class 3.1 (Lab): Fighting Process Injection with x32dbg (Module 6: Process Injection) #5, 3 months, 14 days after release (2026-01-11 18:26:08) 85
Class 3 (Chall): Find the Window (Module 6: Process Injection) #7, 6 months, 18 days after release (2026-01-11 18:24:42) 80
Class 2.1 (Lab): SetThreadContext Technique (Module 6: Process Injection) #8, 1 year, 8 months after release (2026-01-11 18:12:59) 75
Class 2 (Lab): SetThreadContext Technique (Module 6: Process Injection) #7, 1 year, 8 months after release (2026-01-11 18:11:16) 75
Class 1 (Lab): CreateRemoteThread Technique (Module 6: Process Injection) #7, 1 year, 8 months after release (2026-01-11 18:04:32) 75
Class 5 (Lab): Anti-Malware Ticks (Module 5: Aniti-Malware Tricks) #6, 1 year, 8 months after release (2026-01-11 12:12:53) 78
Class 4.2 (Chall): Find the Offset (Module 5: Aniti-Malware Tricks) #7, 6 months, 20 days after release (2026-01-11 11:30:22) 76
Class 4.1 (Chall): Patch the Binary (Module 5: Aniti-Malware Tricks) #7, 6 months, 22 days after release (2026-01-11 11:26:28) 75
Class 4 (Lab): Anti-Debugging Ticks (Module 5: Aniti-Malware Tricks) #6, 1 year, 8 months after release (2026-01-04 09:39:26) 71
Class 3 (Brief): Process Injection (Module 5: Aniti-Malware Tricks) #7, 1 year, 8 months after release (2026-01-01 16:21:28) 70
Class 2 (Brief): Anti-VM and Packers (Module 5: Aniti-Malware Tricks) #7, 1 year, 10 months after release (2026-01-01 16:18:56) 69
Class 1 (Brief): Anti-Debugging (Module 5: Aniti-Malware Tricks) #7, 1 year, 10 months after release (2026-01-01 10:39:44) 68
Class 4.2 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #8, 7 months, 7 days after release (2026-01-01 10:37:40) 57
Class 4.1 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #8, 1 year, 8 months after release (2026-01-01 10:25:13) 56
Class 4 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #8, 1 year, 8 months after release (2026-01-01 09:57:32) 56
Class 5 (Chall): Unpacking UPX your way (Module 4: Packers & Obfuscators) #7, 7 months, 7 days after release (2026-01-01 01:01:05) 65
Class 6 (Chall): Unpacking for Flag (Module 4: Packers & Obfuscators) #6, 7 months, 7 days after release (2026-01-01 00:54:24) 75
Class 3.1 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #8, 1 year, 8 months after release (2026-01-01 00:41:40) 55
Class 3 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #7, 1 year, 8 months after release (2025-12-31 13:13:11) 55
Class 2 (Brief):Unpacking & Deobfuscation Strategy (Module 4: Packers & Obfuscators) #9, 1 year, 10 months after release (2025-12-31 12:56:19) 50
Class 1 (Brief): Carnita Methodology (Module 4: Packers & Obfuscators) #10, 1 year, 10 months after release (2025-12-31 12:37:39) 50
Class 6 (Chall): G0T Password? (Module 3: Reverse Engineering) #6, 7 months, 2 days after release (2025-12-27 02:24:44) 75
Class 5.1 (Lab): Find the Password (Module 3: Reverse Engineering) #7, 1 year, 8 months after release (2025-12-27 02:22:32) 68
Class 5 (Lab): Find the Password (Module 3: Reverse Engineering) #7, 1 year, 8 months after release (2025-12-27 02:20:56) 67
Class 4.2 (Chall): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #6, 7 months, 2 days after release (2025-12-27 02:19:03) 66
Class 4.1 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #7, 1 year, 8 months after release (2025-12-27 02:13:08) 65
Class 4 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #6, 1 year, 8 months after release (2025-12-27 02:10:24) 65
Class 3.2 (Chall): Calling Conventions (Module 3: Reverse Engineering) #6, 7 months, 2 days after release (2025-12-27 02:05:39) 61
Class 3.1 (Chall): Calling Conventions (Module 3: Reverse Engineering) #7, 7 months, 2 days after release (2025-12-27 02:04:48) 61
Class 3 (Brief): Calling Conventions (Module 3: Reverse Engineering) #7, 1 year, 10 months after release (2025-12-27 02:04:39) 60
Class 2 (Brief): Assembly Operands (Module 3: Reverse Engineering) #7, 1 year, 10 months after release (2025-12-27 02:02:51) 60
Class 1 (Brief): Disassembler Process (Module 3: Reverse Engineering) #9, 1 year, 10 months after release (2025-12-27 02:01:46) 60
Class 5.2 (Lab): Inetsim 101 (Module 2: Tools Arsenal) #10, 7 months, 24 days after release (2025-12-27 02:00:28) 46
Class 5.1 (Lab): Fakenet 101 (Module 2: Tools Arsenal) #11, 7 months, 24 days after release (2025-12-27 01:58:16) 46
Class 5 (Lab): Wireshark 101 (Module 2: Tools Arsenal) #11, 7 months, 24 days after release (2025-12-27 01:54:47) 46
Class 4.1 (Chall): Debuggers & Disassemblers (Module 2: Tools Arsenal) #11, 7 months, 2 days after release (2025-12-27 01:46:52) 41
Class 4 (Lab): Debuggers & Disassemblers (Module 2: Tools Arsenal) #10, 1 year, 8 months after release (2025-12-27 01:45:41) 40
Class 3 (Chall): PE Editors Exercise (Module 2: Tools Arsenal) #11, 1 year, 8 months after release (2025-12-27 01:23:34) 30
Class 2 (Brief): WinDbg, IDA Pro & Qilinq (Module 2: Tools Arsenal) #12, 1 year, 9 months after release (2025-12-27 01:10:54) 30
Class 1 (Brief): PE Editors & Process Explorer (Module 2: Tools Arsenal) #12, 1 year, 9 months after release (2025-12-27 01:03:07) 30
Class 5 (Brief): Process and Network Monitoring (Module 1: Dynamic Analysis) #13, 8 months, 13 days after release (2025-12-27 00:57:50) 30
Class 4 (Lab): Analysis Inside a Virtual Machine (Module 1: Dynamic Analysis) #13, 1 year, 8 months after release (2025-12-26 15:43:46) 20
Class 3 (Lab): Sandbox Analysis (Module 1: Dynamic Analysis) #13, 1 year, 8 months after release (2025-12-26 13:29:25) 20
Class 2 (Brief): Analysis Lab & Tools (Module 1: Dynamic Analysis) #13, 1 year, 10 months after release (2025-12-26 13:23:40) 20
Class 1 (Brief): Malicious Software 101 (Module 1: Dynamic Analysis) #13, 1 year, 10 months after release (2025-12-26 13:04:25) 20
Class 5 (Lab): Windows Binaries Example (Module 0: Windows Binaries) #13, 1 year, 8 months after release (2025-12-25 22:55:25) 10
Class 4 (Brief): .NET Assemblies (Module 0: Windows Binaries) #12, 1 year, 8 months after release (2025-11-04 10:45:58) 10
Class 3 (Brief): Windows Loader (Module 0: Windows Binaries) #14, 1 year, 8 months after release (2025-11-04 09:40:50) 10
Class 2 (Brief): Windows Executables Format (Module 0: Windows Binaries) #13, 1 year, 8 months after release (2025-10-28 10:08:15) 10
Class 1 (Brief): Compiling & Building Executables (Module 0: Windows Binaries) #16, 1 year, 7 months after release (2025-10-28 08:34:54) 10