Module 0: Windows Binaries, 50 / 50 (100%)
100% complete
Module 1: Dynamic Analysis, 110 / 110 (100%)
100% complete
Module 2: Tools Arsenal, 309 / 309 (100%)
100% complete
Module 3: Packers & Obfuscators, 519 / 519 (100%)
100% complete
Module 4: Reverse Engineering, 708 / 708 (100%)
100% complete
Module 5: Aniti-Malware Tricks, 507 / 507 (100%)
100% complete
Module 6: Process Injection, 585 / 585 (100%)
100% complete
Module 7: .NET Reversing, 1,427 / 1,427 (100%)
100% complete
Module 8: Dissecting Infostealers like a BOSS, 903 / 903 (100%)
100% complete
Module 9: Fighting Ransomware, 680 / 880 (77%)
77.272727272727% complete
Total: 5,798 / 5,998 (96.7%)
Challenge Solved Points
Class 5 (Chall): Restoring Locked Keyboard (Module 9: Fighting Ransomware) Second to solve this challenge! 7 months, 2 days after release (2025-12-04 22:11:44) 130
Class 4 (Lab): Reversing Ryuk Ransomware with IDA (Module 9: Fighting Ransomware) Second to solve this challenge! 1 year, 2 months after release (2025-12-04 21:32:58) 120
Class 4.1 (Lab): Recovering Ryuk Files with NeZa (Module 9: Fighting Ransomware) Second to solve this challenge! 5 months, 25 days after release (2025-12-04 21:05:26) 120
Class 3 (Lab): Unhooking a locked machine with NeZa (Module 9: Fighting Ransomware) Second to solve this challenge! 1 year, 2 months after release (2025-12-02 21:23:55) 110
Class 2 (Lab): Intercepting AES key with NeZa (Module 9: Fighting Ransomware) Second to solve this challenge! 1 year, 2 months after release (2025-12-02 20:12:57) 100
Class 1 (Lab): Intercepting RSA key with NeZa (Module 9: Fighting Ransomware) Second to solve this challenge! 1 year, 2 months after release (2025-12-02 11:24:09) 100
Class 5.1 (Chall): Dissecting the Plugin (Module 8: Dissecting Infostealers like a BOSS) Second to solve this challenge! 1 year, 2 months after release (2025-11-24 21:47:54) 150
Class 5 (Chall): Dissecting Infostealer (Module 8: Dissecting Infostealers like a BOSS) Second to solve this challenge! 1 year, 2 months after release (2025-11-21 22:07:49) 120
Class 2 (Lab): Dissecting BAT Downloader (Module 8: Dissecting Infostealers like a BOSS) Second to solve this challenge! 1 year, 2 months after release (2025-11-21 17:29:04) 90
Class 4.2 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) First to solve this challenge! 5 months, 21 days after release (2025-11-14 14:58:35) 91
Class 4.1 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) First to solve this challenge! 5 months, 21 days after release (2025-11-14 10:59:56) 91
Class 4 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) First to solve this challenge! 1 year, 1 month after release (2025-11-14 10:22:16) 91
Class 3.1 (Lab): Dissecting Powershell Dropper (Module 8: Dissecting Infostealers like a BOSS) First to solve this challenge! 5 months, 20 days after release (2025-11-13 17:39:25) 90
Class 3 (Lab): Dissecting Powershell Dropper with NeZa (Module 8: Dissecting Infostealers like a BOSS) First to solve this challenge! 1 year, 1 month after release (2025-11-12 09:47:37) 90
Class 1 (Lab): Scripts 101 (Module 8: Dissecting Infostealers like a BOSS) Second to solve this challenge! 1 year, 1 month after release (2025-11-10 12:43:25) 90
Class 4.5 (Chall): Find the Keylogger Actor (Module 7: .NET Reversing) Second to solve this challenge! 17 days, 21 hours after release (2025-11-06 18:57:55) 210
Class 4.4 (Lab): Finding & Automating the Decryption of Third Stage (Module 7: .NET Reversing) Second to solve this challenge! 1 year, 6 months after release (2025-11-06 09:36:23) 200
Class 4.3 (Chall): Found the Parent (Module 7: .NET Reversing) Second to solve this challenge! 20 days, 6 hours after release (2025-10-29 21:26:38) 125
Class 4.2 (Lab): Finding Second Stage Entry Point (Module 7: .NET Reversing) Second to solve this challenge! 1 year, 6 months after release (2025-10-28 19:51:47) 115
Class 4.1.2 (Lab): WinDBG SOS Update (Module 7: .NET Reversing) First to solve this challenge! 23 hours, 20 minutes after release (2025-10-10 15:01:55) 112
Class 4.1 (Lab): Introducing WinDbg SOS Plugin (Module 7: .NET Reversing) Second to solve this challenge! 1 year, 5 months after release (2025-10-10 15:00:00) 110
Class 4 (Lab): Limitations of DnSpy (Module 7: .NET Reversing) Second to solve this challenge! 1 year, 5 months after release (2025-10-10 09:49:59) 105
Class 3 (Lab): Patching Binary for Dumping (Module 7: .NET Reversing) Third to solve this challenge! 1 year, 5 months after release (2025-10-09 13:34:14) 100
Class 2 (Lab): Deobfuscating Stage1 from Resources (Module 7: .NET Reversing) Third to solve this challenge! 1 year, 5 months after release (2025-10-09 10:38:07) 95
Class 1.2 (Chall) FindMethod by Name (Module 7: .NET Reversing) Third to solve this challenge! 2 months, 21 days after release (2025-10-08 12:07:07) 90
Class 1.1 (Chall) FindMethod by ID (Module 7: .NET Reversing) Third to solve this challenge! 2 months, 21 days after release (2025-10-08 11:13:52) 85
Class 5 (Chall): Intercept the Shellcode (Module 6: Process Injection) #4, 1 month, 20 days after release (2025-10-07 15:59:19) 100
Class 3.1 (Lab): Fighting Process Injection with x32dbg (Module 6: Process Injection) Second to solve this challenge! 8 days, 10 hours after release (2025-10-07 08:23:56) 85
Class 4 (Chall): Find the Shellcode (Module 6: Process Injection) Third to solve this challenge! 2 months, 23 days after release (2025-09-16 20:48:40) 95
Class 2.1 (Lab): SetThreadContext Technique (Module 6: Process Injection) #5, 1 year, 4 months after release (2025-09-15 00:23:29) 75
Class 1 (Lab): Reflection 101 (Module 7: .NET Reversing) First to solve this challenge! 1 year, 4 months after release (2025-09-13 12:58:10) 80
Class 3 (Chall): Find the Window (Module 6: Process Injection) Third to solve this challenge! 2 months, 18 days after release (2025-09-11 15:35:54) 80
Class 2 (Lab): SetThreadContext Technique (Module 6: Process Injection) #4, 1 year, 4 months after release (2025-09-11 11:24:17) 75
Class 1 (Lab): CreateRemoteThread Technique (Module 6: Process Injection) #4, 1 year, 4 months after release (2025-09-10 19:58:44) 75
Class 5 (Lab): Anti-Malware Ticks (Module 5: Aniti-Malware Tricks) Third to solve this challenge! 1 year, 4 months after release (2025-09-10 17:58:20) 78
Class 4.2 (Chall): Find the Offset (Module 5: Aniti-Malware Tricks) Third to solve this challenge! 2 months, 18 days after release (2025-09-09 08:28:38) 76
Class 4.1 (Chall): Patch the Binary (Module 5: Aniti-Malware Tricks) Third to solve this challenge! 2 months, 20 days after release (2025-09-08 22:55:10) 75
Class 4 (Lab): Anti-Debugging Ticks (Module 5: Aniti-Malware Tricks) Third to solve this challenge! 1 year, 4 months after release (2025-09-08 22:50:09) 71
Class 3 (Brief): Process Injection (Module 5: Aniti-Malware Tricks) Third to solve this challenge! 1 year, 4 months after release (2025-09-05 16:18:50) 70
Class 2 (Brief): Anti-VM and Packers (Module 5: Aniti-Malware Tricks) Third to solve this challenge! 1 year, 6 months after release (2025-09-05 15:38:26) 69
Class 1 (Brief): Anti-Debugging (Module 5: Aniti-Malware Tricks) Third to solve this challenge! 1 year, 6 months after release (2025-09-05 15:17:25) 68
Class 5.1 (Lab): Find the Password (Module 4: Reverse Engineering) Third to solve this challenge! 1 year, 4 months after release (2025-09-05 14:51:48) 68
Class 6 (Chall): G0T Password? (Module 4: Reverse Engineering) Third to solve this challenge! 3 months, 12 days after release (2025-09-05 14:45:00) 75
Class 5 (Lab): Find the Password (Module 4: Reverse Engineering) Third to solve this challenge! 1 year, 4 months after release (2025-09-05 13:35:25) 67
Class 4.2 (Chall): Windows 32-bit Calling Convention (Module 4: Reverse Engineering) Third to solve this challenge! 3 months, 11 days after release (2025-09-04 21:58:34) 66
Class 4.1 (Lab): Windows 32-bit Calling Convention (Module 4: Reverse Engineering) Third to solve this challenge! 1 year, 4 months after release (2025-09-04 20:43:49) 65
Class 4 (Lab): Windows 32-bit Calling Convention (Module 4: Reverse Engineering) Third to solve this challenge! 1 year, 4 months after release (2025-09-04 14:20:26) 65
Class 3.2 (Chall): Calling Conventions (Module 4: Reverse Engineering) Third to solve this challenge! 3 months, 10 days after release (2025-09-04 10:26:48) 61
Class 3.1 (Chall): Calling Conventions (Module 4: Reverse Engineering) Third to solve this challenge! 3 months, 10 days after release (2025-09-04 10:24:46) 61
Class 3 (Brief): Calling Conventions (Module 4: Reverse Engineering) Third to solve this challenge! 1 year, 6 months after release (2025-09-04 09:41:11) 60
Class 2 (Brief): Assembly Operands (Module 4: Reverse Engineering) Third to solve this challenge! 1 year, 6 months after release (2025-09-04 09:37:48) 60
Class 1 (Brief): Disassembler Process (Module 4: Reverse Engineering) Third to solve this challenge! 1 year, 6 months after release (2025-09-04 08:15:23) 60
Class 6 (Chall): Unpacking for Flag (Module 3: Packers & Obfuscators) Third to solve this challenge! 3 months, 10 days after release (2025-09-03 21:32:25) 75
Class 5.2 (Lab): Inetsim 101 (Module 2: Tools Arsenal) #4, 3 months, 26 days after release (2025-08-29 08:22:05) 46
Class 5 (Chall): Unpacking UPX your way (Module 3: Packers & Obfuscators) Third to solve this challenge! 3 months after release (2025-08-24 22:17:33) 65
Class 4.2 (Lab): Unpacking ASPack (Module 3: Packers & Obfuscators) Third to solve this challenge! 2 months, 9 days after release (2025-08-03 10:13:32) 57
Class 4.1 (Lab): Unpacking ASPack (Module 3: Packers & Obfuscators) Third to solve this challenge! 1 year, 3 months after release (2025-07-29 03:05:26) 56
Class 4 (Lab): Unpacking ASPack (Module 3: Packers & Obfuscators) Third to solve this challenge! 1 year, 3 months after release (2025-07-25 19:10:31) 56
Class 3.1 (Lab): Unpacking UPX (Module 3: Packers & Obfuscators) Third to solve this challenge! 1 year, 3 months after release (2025-07-25 19:03:10) 55
Class 3 (Lab): Unpacking UPX (Module 3: Packers & Obfuscators) Third to solve this challenge! 1 year, 3 months after release (2025-07-25 18:45:51) 55
Class 2 (Brief):Unpacking & Deobfuscation Strategy (Module 3: Packers & Obfuscators) Third to solve this challenge! 1 year, 5 months after release (2025-07-25 07:18:25) 50
Class 1 (Brief): Carnita Methodology (Module 3: Packers & Obfuscators) Third to solve this challenge! 1 year, 5 months after release (2025-07-25 06:25:38) 50
Class 5.1 (Lab): Fakenet 101 (Module 2: Tools Arsenal) Third to solve this challenge! 2 months, 13 days after release (2025-07-15 20:04:30) 46
Class 5 (Lab): Wireshark 101 (Module 2: Tools Arsenal) Third to solve this challenge! 2 months, 10 days after release (2025-07-13 12:49:01) 46
Class 4.1 (Chall): Debuggers & Disassemblers (Module 2: Tools Arsenal) Third to solve this challenge! 1 month, 16 days after release (2025-07-13 10:37:44) 41
Class 4 (Lab): Debuggers & Disassemblers (Module 2: Tools Arsenal) Third to solve this challenge! 1 year, 3 months after release (2025-07-13 10:37:25) 40
Class 3 (Chall): PE Editors Exercise (Module 2: Tools Arsenal) Third to solve this challenge! 1 year, 2 months after release (2025-07-12 21:47:49) 30
Class 2 (Brief): WinDbg, IDA Pro & Qilinq (Module 2: Tools Arsenal) Third to solve this challenge! 1 year, 3 months after release (2025-07-12 21:00:39) 30
Class 1 (Brief): PE Editors & Process Explorer (Module 2: Tools Arsenal) Third to solve this challenge! 1 year, 3 months after release (2025-07-12 20:31:21) 30
Class 5 (Brief): Process and Network Monitoring (Module 1: Dynamic Analysis) Third to solve this challenge! 2 months, 30 days after release (2025-07-12 20:07:13) 30
Class 4 (Lab): Analysis Inside a Virtual Machine (Module 1: Dynamic Analysis) Third to solve this challenge! 1 year, 2 months after release (2025-07-12 18:21:39) 20
Class 3 (Lab): Sandbox Analysis (Module 1: Dynamic Analysis) Third to solve this challenge! 1 year, 2 months after release (2025-07-11 09:26:15) 20
Class 2 (Brief): Analysis Lab & Tools (Module 1: Dynamic Analysis) Third to solve this challenge! 1 year, 4 months after release (2025-07-11 09:21:25) 20
Class 1 (Brief): Malicious Software 101 (Module 1: Dynamic Analysis) Third to solve this challenge! 1 year, 4 months after release (2025-07-11 08:08:08) 20
Class 5 (Lab): Windows Binaries Example (Module 0: Windows Binaries) Third to solve this challenge! 1 year, 2 months after release (2025-07-11 07:43:28) 10
Class 4 (Brief): .NET Assemblies (Module 0: Windows Binaries) Third to solve this challenge! 1 year, 4 months after release (2025-07-09 09:41:33) 10
Class 3 (Brief): Windows Loader (Module 0: Windows Binaries) #4, 1 year, 4 months after release (2025-07-09 09:15:00) 10
Class 2 (Brief): Windows Executables Format (Module 0: Windows Binaries) #5, 1 year, 4 months after release (2025-07-09 07:43:17) 10
Class 1 (Brief): Compiling & Building Executables (Module 0: Windows Binaries) #5, 1 year, 3 months after release (2025-07-09 07:13:44) 10