Module 0: Windows Binaries, 50 / 50 (100%)
100% complete
Module 1: Dynamic Analysis, 110 / 110 (100%)
100% complete
Module 2: Tools Arsenal, 309 / 309 (100%)
100% complete
Module 3: Reverse Engineering, 708 / 708 (100%)
100% complete
Module 4: Packers & Obfuscators, 519 / 519 (100%)
100% complete
Module 5: Aniti-Malware Tricks, 0 / 507 (0%)
0% complete
Module 6: Process Injection, 0 / 585 (0%)
0% complete
Module 7: .NET Reversing, 0 / 1,427 (0%)
0% complete
Module 8: Dissecting Infostealers like a BOSS, 0 / 903 (0%)
0% complete
Module 9: Fighting Ransomware, 0 / 880 (0%)
0% complete
Total: 1,696 / 5,998 (28.3%)
Challenge Solved Points
Class 6 (Chall): Unpacking for Flag (Module 4: Packers & Obfuscators) #13, 11 months, 1 day after release (2026-04-26 16:54:23) 75
Class 5 (Chall): Unpacking UPX your way (Module 4: Packers & Obfuscators) #13, 11 months, 1 day after release (2026-04-26 16:03:26) 65
Class 4.2 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #14, 11 months after release (2026-04-26 07:50:12) 57
Class 4.1 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #14, 2 years after release (2026-04-26 07:19:40) 56
Class 4 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #15, 2 years after release (2026-04-26 06:42:17) 56
Class 3.1 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #15, 2 years after release (2026-04-26 06:18:31) 55
Class 3 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #14, 2 years after release (2026-04-26 06:04:47) 55
Class 2 (Brief):Unpacking & Deobfuscation Strategy (Module 4: Packers & Obfuscators) #16, 2 years, 2 months after release (2026-04-26 05:50:54) 50
Class 1 (Brief): Carnita Methodology (Module 4: Packers & Obfuscators) #17, 2 years, 2 months after release (2026-04-26 05:27:21) 50
Class 6 (Chall): G0T Password? (Module 3: Reverse Engineering) #13, 10 months, 21 days after release (2026-04-16 14:47:55) 75
Class 5.1 (Lab): Find the Password (Module 3: Reverse Engineering) #14, 1 year, 11 months after release (2026-04-16 14:42:13) 68
Class 5 (Lab): Find the Password (Module 3: Reverse Engineering) #14, 1 year, 11 months after release (2026-04-16 12:45:28) 67
Class 4.2 (Chall): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #13, 10 months, 21 days after release (2026-04-16 12:35:42) 66
Class 4.1 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #14, 1 year, 11 months after release (2026-04-11 12:47:39) 65
Class 4 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #13, 1 year, 11 months after release (2026-04-11 03:27:36) 65
Class 3.2 (Chall): Calling Conventions (Module 3: Reverse Engineering) #13, 10 months, 14 days after release (2026-04-10 08:14:06) 61
Class 3.1 (Chall): Calling Conventions (Module 3: Reverse Engineering) #14, 10 months, 14 days after release (2026-04-10 08:06:39) 61
Class 3 (Brief): Calling Conventions (Module 3: Reverse Engineering) #15, 2 years, 1 month after release (2026-04-10 08:06:29) 60
Class 2 (Brief): Assembly Operands (Module 3: Reverse Engineering) #16, 2 years, 1 month after release (2026-04-10 08:05:30) 60
Class 1 (Brief): Disassembler Process (Module 3: Reverse Engineering) #17, 2 years, 1 month after release (2026-04-10 07:43:20) 60
Class 5 (Lab): Wireshark 101 (Module 2: Tools Arsenal) #18, 11 months, 6 days after release (2026-04-10 07:15:43) 46
Class 5.2 (Lab): Inetsim 101 (Module 2: Tools Arsenal) #17, 11 months, 5 days after release (2026-04-09 15:05:08) 46
Class 5.1 (Lab): Fakenet 101 (Module 2: Tools Arsenal) #18, 11 months, 5 days after release (2026-04-09 13:22:17) 46
Class 4.1 (Chall): Debuggers & Disassemblers (Module 2: Tools Arsenal) #18, 10 months, 14 days after release (2026-04-09 12:07:29) 41
Class 4 (Lab): Debuggers & Disassemblers (Module 2: Tools Arsenal) #16, 1 year, 11 months after release (2026-04-09 12:06:04) 40
Class 3 (Chall): PE Editors Exercise (Module 2: Tools Arsenal) #20, 1 year, 11 months after release (2026-04-09 11:36:54) 30
Class 2 (Brief): WinDbg, IDA Pro & Qilinq (Module 2: Tools Arsenal) #19, 2 years after release (2026-04-03 09:39:33) 30
Class 1 (Brief): PE Editors & Process Explorer (Module 2: Tools Arsenal) #19, 2 years after release (2026-04-03 09:15:43) 30
Class 5 (Brief): Process and Network Monitoring (Module 1: Dynamic Analysis) #20, 11 months, 19 days after release (2026-04-03 09:06:26) 30
Class 4 (Lab): Analysis Inside a Virtual Machine (Module 1: Dynamic Analysis) #20, 1 year, 11 months after release (2026-04-03 08:16:48) 20
Class 3 (Lab): Sandbox Analysis (Module 1: Dynamic Analysis) #21, 1 year, 11 months after release (2026-04-03 07:33:37) 20
Class 2 (Brief): Analysis Lab & Tools (Module 1: Dynamic Analysis) #22, 2 years, 1 month after release (2026-04-03 07:28:52) 20
Class 1 (Brief): Malicious Software 101 (Module 1: Dynamic Analysis) #23, 2 years, 1 month after release (2026-04-03 06:46:31) 20
Class 5 (Lab): Windows Binaries Example (Module 0: Windows Binaries) #23, 1 year, 11 months after release (2026-04-03 06:22:52) 10
Class 4 (Brief): .NET Assemblies (Module 0: Windows Binaries) #30, 2 years, 1 month after release (2026-04-03 03:13:53) 10
Class 3 (Brief): Windows Loader (Module 0: Windows Binaries) #30, 2 years, 1 month after release (2026-04-03 02:22:46) 10
Class 2 (Brief): Windows Executables Format (Module 0: Windows Binaries) #34, 2 years, 1 month after release (2026-04-03 01:04:47) 10
Class 1 (Brief): Compiling & Building Executables (Module 0: Windows Binaries) #41, 2 years after release (2026-04-03 00:32:55) 10