Module 0: Windows Binaries, 50 / 50 (100%)
100% complete
Module 1: Dynamic Analysis, 110 / 110 (100%)
100% complete
Module 2: Tools Arsenal, 309 / 309 (100%)
100% complete
Module 3: Reverse Engineering, 708 / 708 (100%)
100% complete
Module 4: Packers & Obfuscators, 519 / 519 (100%)
100% complete
Module 5: Aniti-Malware Tricks, 507 / 507 (100%)
100% complete
Module 6: Process Injection, 585 / 585 (100%)
100% complete
Module 7: .NET Reversing, 455 / 1,427 (32%)
31.885073580939% complete
Module 8: Dissecting Infostealers like a BOSS, 0 / 903 (0%)
0% complete
Module 9: Fighting Ransomware, 0 / 880 (0%)
0% complete
Total: 3,243 / 5,998 (54.1%)
Challenge Solved Points
Class 2 (Lab): Deobfuscating Stage1 from Resources (Module 7: .NET Reversing) #9, 2 years after release (2026-04-30 15:03:55) 95
Class 4 (Lab): Limitations of DnSpy (Module 7: .NET Reversing) #9, 1 year, 11 months after release (2026-04-25 15:20:21) 105
Class 1.2 (Chall) FindMethod by Name (Module 7: .NET Reversing) #10, 9 months, 1 day after release (2026-04-20 22:27:19) 90
Class 1.1 (Chall) FindMethod by ID (Module 7: .NET Reversing) #10, 9 months, 1 day after release (2026-04-20 22:06:12) 85
Class 1 (Lab): Reflection 101 (Module 7: .NET Reversing) #10, 1 year, 11 months after release (2026-04-11 15:48:07) 80
Class 5 (Chall): Intercept the Shellcode (Module 6: Process Injection) #10, 7 months, 10 days after release (2026-03-27 00:53:59) 100
Class 4 (Chall): Find the Shellcode (Module 6: Process Injection) #10, 9 months after release (2026-03-27 00:14:21) 95
Class 3.1 (Lab): Fighting Process Injection with x32dbg (Module 6: Process Injection) #9, 5 months, 28 days after release (2026-03-26 21:54:28) 85
Class 3 (Chall): Find the Window (Module 6: Process Injection) #10, 9 months after release (2026-03-26 21:41:59) 80
Class 2.1 (Lab): SetThreadContext Technique (Module 6: Process Injection) #11, 1 year, 11 months after release (2026-03-26 21:37:01) 75
Class 2 (Lab): SetThreadContext Technique (Module 6: Process Injection) #10, 1 year, 11 months after release (2026-03-26 21:12:30) 75
Class 1 (Lab): CreateRemoteThread Technique (Module 6: Process Injection) #10, 1 year, 11 months after release (2026-03-26 20:36:05) 75
Class 5 (Lab): Anti-Malware Ticks (Module 5: Aniti-Malware Tricks) #9, 1 year, 11 months after release (2026-03-26 17:50:45) 78
Class 4.2 (Chall): Find the Offset (Module 5: Aniti-Malware Tricks) #9, 9 months, 2 days after release (2026-03-26 16:24:45) 76
Class 4.1 (Chall): Patch the Binary (Module 5: Aniti-Malware Tricks) #9, 9 months, 4 days after release (2026-03-26 15:11:02) 75
Class 4 (Lab): Anti-Debugging Ticks (Module 5: Aniti-Malware Tricks) #9, 1 year, 11 months after release (2026-03-26 13:30:31) 71
Class 3 (Brief): Process Injection (Module 5: Aniti-Malware Tricks) #10, 1 year, 11 months after release (2026-03-26 04:25:02) 70
Class 2 (Brief): Anti-VM and Packers (Module 5: Aniti-Malware Tricks) #10, 2 years, 1 month after release (2026-03-26 04:02:40) 69
Class 1 (Brief): Anti-Debugging (Module 5: Aniti-Malware Tricks) #10, 2 years, 1 month after release (2026-03-26 03:54:03) 68
Class 6 (Chall): Unpacking for Flag (Module 4: Packers & Obfuscators) #9, 9 months, 30 days after release (2026-03-26 01:49:56) 75
Class 5 (Chall): Unpacking UPX your way (Module 4: Packers & Obfuscators) #9, 9 months, 30 days after release (2026-03-26 00:57:40) 65
Class 4.2 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #10, 9 months, 30 days after release (2026-03-25 14:39:57) 57
Class 4.1 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #10, 1 year, 11 months after release (2026-03-25 01:14:37) 56
Class 4 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #10, 1 year, 11 months after release (2026-03-25 00:52:02) 56
Class 3.1 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #11, 1 year, 11 months after release (2026-03-25 00:09:47) 55
Class 3 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #11, 1 year, 11 months after release (2026-03-24 22:08:11) 55
Class 2 (Brief):Unpacking & Deobfuscation Strategy (Module 4: Packers & Obfuscators) #13, 2 years, 1 month after release (2026-03-24 21:29:11) 50
Class 1 (Brief): Carnita Methodology (Module 4: Packers & Obfuscators) #14, 2 years, 1 month after release (2026-03-24 21:07:28) 50
Class 6 (Chall): G0T Password? (Module 3: Reverse Engineering) #11, 9 months, 28 days after release (2026-03-24 02:23:32) 75
Class 5 (Lab): Find the Password (Module 3: Reverse Engineering) #12, 1 year, 11 months after release (2026-03-24 02:20:09) 67
Class 5.1 (Lab): Find the Password (Module 3: Reverse Engineering) #12, 1 year, 11 months after release (2026-03-24 02:16:33) 68
Class 4.2 (Chall): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #11, 9 months, 28 days after release (2026-03-24 01:50:21) 66
Class 4.1 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #12, 1 year, 11 months after release (2026-03-24 01:33:20) 65
Class 4 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #12, 1 year, 11 months after release (2026-03-24 01:24:14) 65
Class 3.2 (Chall): Calling Conventions (Module 3: Reverse Engineering) #12, 9 months, 28 days after release (2026-03-24 01:03:56) 61
Class 2 (Brief): Assembly Operands (Module 3: Reverse Engineering) #13, 2 years, 1 month after release (2026-03-23 21:28:18) 60
Class 1 (Brief): Disassembler Process (Module 3: Reverse Engineering) #14, 2 years, 1 month after release (2026-03-23 20:44:02) 60
Class 3.1 (Chall): Calling Conventions (Module 3: Reverse Engineering) #11, 9 months, 26 days after release (2026-03-21 22:01:37) 61
Class 3 (Brief): Calling Conventions (Module 3: Reverse Engineering) #12, 2 years after release (2026-03-21 22:01:23) 60
Class 5.2 (Lab): Inetsim 101 (Module 2: Tools Arsenal) #15, 10 months, 17 days after release (2026-03-21 21:56:06) 46
Class 5.1 (Lab): Fakenet 101 (Module 2: Tools Arsenal) #16, 10 months, 17 days after release (2026-03-21 21:49:42) 46
Class 5 (Lab): Wireshark 101 (Module 2: Tools Arsenal) #16, 10 months, 17 days after release (2026-03-21 20:23:32) 46
Class 4 (Lab): Debuggers & Disassemblers (Module 2: Tools Arsenal) #15, 1 year, 11 months after release (2026-03-21 19:23:41) 40
Class 4.1 (Chall): Debuggers & Disassemblers (Module 2: Tools Arsenal) #15, 9 months, 26 days after release (2026-03-21 19:22:16) 41
Class 3 (Chall): PE Editors Exercise (Module 2: Tools Arsenal) #16, 1 year, 11 months after release (2026-03-21 18:22:57) 30
Class 2 (Brief): WinDbg, IDA Pro & Qilinq (Module 2: Tools Arsenal) #17, 1 year, 11 months after release (2026-03-21 17:52:29) 30
Class 1 (Brief): PE Editors & Process Explorer (Module 2: Tools Arsenal) #17, 1 year, 11 months after release (2026-03-21 17:13:49) 30
Class 4 (Lab): Analysis Inside a Virtual Machine (Module 1: Dynamic Analysis) #17, 1 year, 10 months after release (2026-03-01 04:48:02) 20
Class 5 (Brief): Process and Network Monitoring (Module 1: Dynamic Analysis) #17, 10 months, 16 days after release (2026-03-01 04:34:34) 30
Class 3 (Lab): Sandbox Analysis (Module 1: Dynamic Analysis) #17, 1 year, 10 months after release (2026-03-01 03:37:32) 20
Class 2 (Brief): Analysis Lab & Tools (Module 1: Dynamic Analysis) #17, 2 years after release (2026-03-01 03:34:49) 20
Class 1 (Brief): Malicious Software 101 (Module 1: Dynamic Analysis) #17, 2 years after release (2026-03-01 03:00:32) 20
Class 5 (Lab): Windows Binaries Example (Module 0: Windows Binaries) #17, 1 year, 10 months after release (2026-03-01 02:24:08) 10
Class 4 (Brief): .NET Assemblies (Module 0: Windows Binaries) #13, 1 year, 8 months after release (2025-11-12 21:50:29) 10
Class 3 (Brief): Windows Loader (Module 0: Windows Binaries) #14, 1 year, 8 months after release (2025-11-12 19:49:42) 10
Class 2 (Brief): Windows Executables Format (Module 0: Windows Binaries) #14, 1 year, 8 months after release (2025-11-12 18:53:48) 10
Class 1 (Brief): Compiling & Building Executables (Module 0: Windows Binaries) #16, 1 year, 7 months after release (2025-11-12 15:56:47) 10