This user is listed as a non-competitor.
Module 0: Windows Binaries, 30 / 50 (60%)
60% complete
Module 1: Dynamic Analysis, 0 / 110 (0%)
0% complete
Module 2: Tools Arsenal, 0 / 309 (0%)
0% complete
Module 3: Packers & Obfuscators, 0 / 519 (0%)
0% complete
Module 4: Reverse Engineering, 0 / 708 (0%)
0% complete
Module 5: Aniti-Malware Tricks, 0 / 507 (0%)
0% complete
Module 6: Process Injection, 175 / 500 (35%)
35% complete
Module 7: .NET Reversing, 0 / 900 (0%)
0% complete
Module 8: Dissecting Infostealers like a BOSS, 0 / 903 (0%)
0% complete
Module 9: Fighting Ransomware, 0 / 880 (0%)
0% complete
Total: 205 / 5,386 (3.8%)
Challenge Solved Points
Class 2.1 (Lab): SetThreadContext Technique (Module 6: Process Injection) #5, 1 year, 4 months after release (2025-09-13 11:12:24) 75
Class 5 (Chall): Intercept the Shellcode (Module 6: Process Injection) First to solve this challenge! 16 days, 2 hours after release (2025-09-01 23:58:33) 100
Class 3 (Brief): Windows Loader (Module 0: Windows Binaries) Third to solve this challenge! 1 year, 4 months after release (2025-07-02 05:03:01) 10
Class 2 (Brief): Windows Executables Format (Module 0: Windows Binaries) #4, 1 year, 4 months after release (2025-07-02 05:01:44) 10
Class 1 (Brief): Compiling & Building Executables (Module 0: Windows Binaries) #4, 1 year, 3 months after release (2025-07-02 04:03:39) 10