Module 0: Windows Binaries, 50 / 50 (100%)
Module 1: Dynamic Analysis, 20 / 110 (18%)
18.181818181818% complete
Module 2: Tools Arsenal, 0 / 309 (0%)
Module 3: Reverse Engineering, 0 / 708 (0%)
Module 4: Packers & Obfuscators, 0 / 519 (0%)
Module 5: Aniti-Malware Tricks, 0 / 507 (0%)
Module 6: Process Injection, 0 / 585 (0%)
Module 7: .NET Reversing, 0 / 1,427 (0%)
Module 8: Dissecting Infostealers like a BOSS, 0 / 903 (0%)
Module 9: Fighting Ransomware, 0 / 880 (0%)
Total: 70 / 5,998 (1.2%)
| Challenge |
Solved |
Points |
|
Class 1 (Brief): Malicious Software 101
(Module 1: Dynamic Analysis)
|
#26,
2 years, 2 months after release (2026-04-28 04:02:29)
|
20 |
|
Class 5 (Lab): Windows Binaries Example
(Module 0: Windows Binaries)
|
#28,
2 years after release (2026-04-28 02:57:17)
|
10 |
|
Class 4 (Brief): .NET Assemblies
(Module 0: Windows Binaries)
|
#27,
2 years, 1 month after release (2026-03-23 03:04:12)
|
10 |
|
Class 3 (Brief): Windows Loader
(Module 0: Windows Binaries)
|
#27,
2 years, 1 month after release (2026-03-23 02:29:04)
|
10 |
|
Class 2 (Brief): Windows Executables Format
(Module 0: Windows Binaries)
|
#30,
2 years, 1 month after release (2026-03-23 02:18:57)
|
10 |
|
Class 1 (Brief): Compiling & Building Executables
(Module 0: Windows Binaries)
|
#37,
1 year, 11 months after release (2026-03-23 01:27:01)
|
10 |