Module 0: Windows Binaries, 40 / 50 (80%)
Module 1: Dynamic Analysis, 0 / 110 (0%)
Module 2: Tools Arsenal, 0 / 309 (0%)
Module 3: Reverse Engineering, 0 / 708 (0%)
Module 4: Packers & Obfuscators, 266 / 519 (51%)
51.252408477842% complete
Module 5: Aniti-Malware Tricks, 0 / 507 (0%)
Module 6: Process Injection, 0 / 585 (0%)
Module 7: .NET Reversing, 0 / 1,427 (0%)
Module 8: Dissecting Infostealers like a BOSS, 0 / 903 (0%)
Module 9: Fighting Ransomware, 0 / 880 (0%)
Total: 306 / 5,998 (5.1%)
| Challenge |
Solved |
Points |
|
Class 4 (Lab): Unpacking ASPack
(Module 4: Packers & Obfuscators)
|
#14,
2 years after release (2026-04-23 08:27:42)
|
56 |
|
Class 3.1 (Lab): Unpacking UPX
(Module 4: Packers & Obfuscators)
|
#14,
2 years after release (2026-04-23 08:27:21)
|
55 |
|
Class 3 (Lab): Unpacking UPX
(Module 4: Packers & Obfuscators)
|
#13,
2 years after release (2026-04-23 08:26:27)
|
55 |
|
Class 1 (Brief): Carnita Methodology
(Module 4: Packers & Obfuscators)
|
#16,
2 years, 2 months after release (2026-04-23 08:21:48)
|
50 |
|
Class 2 (Brief):Unpacking & Deobfuscation Strategy
(Module 4: Packers & Obfuscators)
|
#15,
2 years, 2 months after release (2026-04-23 08:20:05)
|
50 |
|
Class 4 (Brief): .NET Assemblies
(Module 0: Windows Binaries)
|
#34,
2 years, 2 months after release (2026-04-23 07:53:00)
|
10 |
|
Class 3 (Brief): Windows Loader
(Module 0: Windows Binaries)
|
#36,
2 years, 2 months after release (2026-04-23 07:49:31)
|
10 |
|
Class 2 (Brief): Windows Executables Format
(Module 0: Windows Binaries)
|
#37,
2 years, 2 months after release (2026-04-23 07:48:15)
|
10 |
|
Class 1 (Brief): Compiling & Building Executables
(Module 0: Windows Binaries)
|
#33,
1 year, 11 months after release (2026-03-18 03:26:07)
|
10 |