Module 0: Windows Binaries, 50 / 50 (100%)
Module 1: Dynamic Analysis, 110 / 110 (100%)
Module 2: Tools Arsenal, 0 / 309 (0%)
Module 3: Reverse Engineering, 0 / 708 (0%)
Module 4: Packers & Obfuscators, 0 / 519 (0%)
Module 5: Aniti-Malware Tricks, 0 / 507 (0%)
Module 6: Process Injection, 0 / 585 (0%)
Module 7: .NET Reversing, 0 / 1,427 (0%)
Module 8: Dissecting Infostealers like a BOSS, 0 / 903 (0%)
Module 9: Fighting Ransomware, 0 / 880 (0%)
Total: 160 / 5,998 (2.7%)
| Challenge |
Solved |
Points |
|
Class 4 (Lab): Analysis Inside a Virtual Machine
(Module 1: Dynamic Analysis)
|
#12,
1 year, 8 months after release (2025-12-21 23:13:13)
|
20 |
|
Class 5 (Brief): Process and Network Monitoring
(Module 1: Dynamic Analysis)
|
#12,
8 months, 8 days after release (2025-12-21 23:00:28)
|
30 |
|
Class 3 (Lab): Sandbox Analysis
(Module 1: Dynamic Analysis)
|
#12,
1 year, 8 months after release (2025-12-13 15:57:21)
|
20 |
|
Class 2 (Brief): Analysis Lab & Tools
(Module 1: Dynamic Analysis)
|
#12,
1 year, 9 months after release (2025-12-13 13:07:59)
|
20 |
|
Class 1 (Brief): Malicious Software 101
(Module 1: Dynamic Analysis)
|
#12,
1 year, 9 months after release (2025-12-12 20:36:56)
|
20 |
|
Class 5 (Lab): Windows Binaries Example
(Module 0: Windows Binaries)
|
#12,
1 year, 7 months after release (2025-12-12 12:57:07)
|
10 |
|
Class 4 (Brief): .NET Assemblies
(Module 0: Windows Binaries)
|
#17,
1 year, 9 months after release (2025-12-11 09:49:05)
|
10 |
|
Class 3 (Brief): Windows Loader
(Module 0: Windows Binaries)
|
#18,
1 year, 9 months after release (2025-12-11 00:00:39)
|
10 |
|
Class 2 (Brief): Windows Executables Format
(Module 0: Windows Binaries)
|
#18,
1 year, 9 months after release (2025-12-10 23:52:40)
|
10 |
|
Class 1 (Brief): Compiling & Building Executables
(Module 0: Windows Binaries)
|
#19,
1 year, 7 months after release (2025-11-23 12:51:03)
|
10 |