Module 0: Windows Binaries, 50 / 50 (100%)
100% complete
Module 1: Dynamic Analysis, 110 / 110 (100%)
100% complete
Module 2: Tools Arsenal, 309 / 309 (100%)
100% complete
Module 3: Reverse Engineering, 708 / 708 (100%)
100% complete
Module 4: Packers & Obfuscators, 519 / 519 (100%)
100% complete
Module 5: Aniti-Malware Tricks, 507 / 507 (100%)
100% complete
Module 6: Process Injection, 585 / 585 (100%)
100% complete
Module 7: .NET Reversing, 1,427 / 1,427 (100%)
100% complete
Module 8: Dissecting Infostealers like a BOSS, 903 / 903 (100%)
100% complete
Module 9: Fighting Ransomware, 550 / 880 (63%)
62.5% complete
Total: 5,668 / 5,998 (94.5%)
Challenge Solved Points
Class 4.1 (Lab): Recovering Ryuk Files with NeZa (Module 9: Fighting Ransomware) Third to solve this challenge! 6 months, 25 days after release (2026-01-04 05:39:17) 120
Class 3 (Lab): Unhooking a locked machine with NeZa (Module 9: Fighting Ransomware) Third to solve this challenge! 1 year, 3 months after release (2026-01-04 05:04:02) 110
Class 4 (Lab): Reversing Ryuk Ransomware with IDA (Module 9: Fighting Ransomware) Third to solve this challenge! 1 year, 3 months after release (2026-01-03 02:32:34) 120
Class 2 (Lab): Intercepting AES key with NeZa (Module 9: Fighting Ransomware) Third to solve this challenge! 1 year, 3 months after release (2026-01-02 03:38:11) 100
Class 1 (Lab): Intercepting RSA key with NeZa (Module 9: Fighting Ransomware) Third to solve this challenge! 1 year, 3 months after release (2026-01-02 03:37:45) 100
Class 3 (Chall): PE Editors Exercise (Module 2: Tools Arsenal) #12, 1 year, 8 months after release (2026-01-02 02:52:37) 30
Class 5.1 (Chall): Dissecting the Plugin (Module 8: Dissecting Infostealers like a BOSS) Third to solve this challenge! 1 year, 3 months after release (2026-01-02 02:03:00) 150
Class 5 (Chall): Dissecting Infostealer (Module 8: Dissecting Infostealers like a BOSS) Third to solve this challenge! 1 year, 3 months after release (2026-01-01 22:38:32) 120
Class 4.2 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) Third to solve this challenge! 7 months, 6 days after release (2025-12-31 03:31:41) 91
Class 4.1 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) Third to solve this challenge! 7 months, 6 days after release (2025-12-31 03:13:17) 91
Class 4 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) Third to solve this challenge! 1 year, 3 months after release (2025-12-31 02:18:12) 91
Class 3.1 (Lab): Dissecting Powershell Dropper (Module 8: Dissecting Infostealers like a BOSS) Third to solve this challenge! 7 months, 6 days after release (2025-12-30 14:08:01) 90
Class 3 (Lab): Dissecting Powershell Dropper with NeZa (Module 8: Dissecting Infostealers like a BOSS) Third to solve this challenge! 1 year, 3 months after release (2025-12-29 13:30:10) 90
Class 2 (Lab): Dissecting BAT Downloader (Module 8: Dissecting Infostealers like a BOSS) Third to solve this challenge! 1 year, 3 months after release (2025-12-29 06:14:32) 90
Class 1 (Lab): Scripts 101 (Module 8: Dissecting Infostealers like a BOSS) Third to solve this challenge! 1 year, 3 months after release (2025-12-29 05:13:36) 90
Class 4.5 (Chall): Find the Keylogger Actor (Module 7: .NET Reversing) Third to solve this challenge! 2 months, 11 days after release (2025-12-29 04:08:00) 210
Class 4.2 (Lab): Finding Second Stage Entry Point (Module 7: .NET Reversing) Third to solve this challenge! 1 year, 8 months after release (2025-12-29 03:45:21) 115
Class 4.3 (Chall): Found the Parent (Module 7: .NET Reversing) Third to solve this challenge! 2 months, 21 days after release (2025-12-29 00:19:46) 125
Class 4.4 (Lab): Finding & Automating the Decryption of Third Stage (Module 7: .NET Reversing) Third to solve this challenge! 1 year, 8 months after release (2025-12-28 23:52:24) 200
Class 4.1.2 (Lab): WinDBG SOS Update (Module 7: .NET Reversing) Third to solve this challenge! 2 months, 21 days after release (2025-12-28 19:53:28) 112
Class 4.1 (Lab): Introducing WinDbg SOS Plugin (Module 7: .NET Reversing) Third to solve this challenge! 1 year, 8 months after release (2025-12-28 19:41:22) 110
Class 4 (Lab): Limitations of DnSpy (Module 7: .NET Reversing) Third to solve this challenge! 1 year, 7 months after release (2025-12-27 07:34:52) 105
Class 3 (Lab): Patching Binary for Dumping (Module 7: .NET Reversing) #4, 1 year, 7 months after release (2025-12-27 06:45:06) 100
Class 2 (Lab): Deobfuscating Stage1 from Resources (Module 7: .NET Reversing) #4, 1 year, 7 months after release (2025-12-27 00:42:40) 95
Class 1.2 (Chall) FindMethod by Name (Module 7: .NET Reversing) #4, 5 months, 8 days after release (2025-12-26 14:59:53) 90
Class 1.1 (Chall) FindMethod by ID (Module 7: .NET Reversing) #4, 5 months, 8 days after release (2025-12-26 04:48:12) 85
Class 1 (Lab): Reflection 101 (Module 7: .NET Reversing) #4, 1 year, 7 months after release (2025-12-26 04:33:50) 80
Class 5 (Chall): Intercept the Shellcode (Module 6: Process Injection) #5, 4 months, 11 days after release (2025-12-26 04:18:50) 100
Class 4 (Chall): Find the Shellcode (Module 6: Process Injection) #5, 6 months, 1 day after release (2025-12-26 01:27:53) 95
Class 3 (Chall): Find the Window (Module 6: Process Injection) #6, 6 months, 1 day after release (2025-12-26 00:24:32) 80
Class 3.1 (Lab): Fighting Process Injection with x32dbg (Module 6: Process Injection) #4, 2 months, 28 days after release (2025-12-25 00:52:04) 85
Class 2.1 (Lab): SetThreadContext Technique (Module 6: Process Injection) #7, 1 year, 8 months after release (2025-12-24 19:20:32) 75
Class 2 (Lab): SetThreadContext Technique (Module 6: Process Injection) #6, 1 year, 7 months after release (2025-12-23 18:40:18) 75
Class 1 (Lab): CreateRemoteThread Technique (Module 6: Process Injection) #6, 1 year, 7 months after release (2025-12-22 06:59:01) 75
Class 5 (Lab): Anti-Malware Ticks (Module 5: Aniti-Malware Tricks) #5, 1 year, 7 months after release (2025-12-21 15:03:46) 78
Class 4.2 (Chall): Find the Offset (Module 5: Aniti-Malware Tricks) #5, 5 months, 29 days after release (2025-12-21 13:00:26) 76
Class 4.1 (Chall): Patch the Binary (Module 5: Aniti-Malware Tricks) #5, 6 months, 1 day after release (2025-12-20 21:48:53) 75
Class 4 (Lab): Anti-Debugging Ticks (Module 5: Aniti-Malware Tricks) #5, 1 year, 7 months after release (2025-12-20 21:48:21) 71
Class 6 (Chall): G0T Password? (Module 3: Reverse Engineering) #5, 6 months, 26 days after release (2025-12-20 04:51:07) 75
Class 5.1 (Lab): Find the Password (Module 3: Reverse Engineering) #6, 1 year, 7 months after release (2025-12-20 04:34:06) 68
Class 5 (Lab): Find the Password (Module 3: Reverse Engineering) #6, 1 year, 7 months after release (2025-12-20 03:00:54) 67
Class 4.1 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #6, 1 year, 7 months after release (2025-12-19 23:37:57) 65
Class 4.2 (Chall): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #5, 6 months, 26 days after release (2025-12-19 23:37:10) 66
Class 4 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #5, 1 year, 7 months after release (2025-12-19 01:16:14) 65
Class 6 (Chall): Unpacking for Flag (Module 4: Packers & Obfuscators) #5, 6 months, 25 days after release (2025-12-19 01:04:52) 75
Class 5 (Chall): Unpacking UPX your way (Module 4: Packers & Obfuscators) #6, 6 months, 24 days after release (2025-12-17 18:34:26) 65
Class 2 (Brief):Unpacking & Deobfuscation Strategy (Module 4: Packers & Obfuscators) #7, 1 year, 9 months after release (2025-12-13 21:10:49) 50
Class 3 (Brief): Process Injection (Module 5: Aniti-Malware Tricks) #6, 1 year, 8 months after release (2025-12-13 20:44:56) 70
Class 2 (Brief): Anti-VM and Packers (Module 5: Aniti-Malware Tricks) #6, 1 year, 9 months after release (2025-12-13 19:35:30) 69
Class 1 (Brief): Anti-Debugging (Module 5: Aniti-Malware Tricks) #6, 1 year, 9 months after release (2025-12-13 19:00:24) 68
Class 5.2 (Lab): Inetsim 101 (Module 2: Tools Arsenal) #8, 7 months, 8 days after release (2025-12-11 00:44:25) 46
Class 5.1 (Lab): Fakenet 101 (Module 2: Tools Arsenal) #9, 7 months, 8 days after release (2025-12-10 22:13:18) 46
Class 5 (Lab): Wireshark 101 (Module 2: Tools Arsenal) #10, 7 months, 8 days after release (2025-12-10 21:18:37) 46
Class 4 (Lab): Analysis Inside a Virtual Machine (Module 1: Dynamic Analysis) #11, 1 year, 7 months after release (2025-12-09 23:56:17) 20
Class 3.2 (Chall): Calling Conventions (Module 3: Reverse Engineering) #4, 5 months, 15 days after release (2025-11-08 17:22:10) 61
Class 3.1 (Chall): Calling Conventions (Module 3: Reverse Engineering) #5, 5 months, 15 days after release (2025-11-08 16:26:46) 61
Class 3 (Brief): Calling Conventions (Module 3: Reverse Engineering) #4, 1 year, 8 months after release (2025-11-08 16:26:20) 60
Class 2 (Brief): Assembly Operands (Module 3: Reverse Engineering) #4, 1 year, 8 months after release (2025-11-08 16:22:20) 60
Class 1 (Brief): Disassembler Process (Module 3: Reverse Engineering) #5, 1 year, 8 months after release (2025-11-08 15:38:00) 60
Class 4.2 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #5, 5 months, 11 days after release (2025-11-05 08:35:19) 57
Class 4.1 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #5, 1 year, 6 months after release (2025-10-26 15:05:28) 56
Class 4 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #5, 1 year, 6 months after release (2025-10-26 11:52:53) 56
Class 3.1 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #5, 1 year, 6 months after release (2025-10-26 10:02:10) 55
Class 3 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #5, 1 year, 6 months after release (2025-10-19 15:32:41) 55
Class 1 (Brief): Carnita Methodology (Module 4: Packers & Obfuscators) #6, 1 year, 7 months after release (2025-10-19 01:31:13) 50
Class 4.1 (Chall): Debuggers & Disassemblers (Module 2: Tools Arsenal) #6, 4 months, 25 days after release (2025-10-19 01:14:38) 41
Class 4 (Lab): Debuggers & Disassemblers (Module 2: Tools Arsenal) #6, 1 year, 6 months after release (2025-10-19 01:13:56) 40
Class 2 (Brief): WinDbg, IDA Pro & Qilinq (Module 2: Tools Arsenal) #6, 1 year, 6 months after release (2025-10-19 00:48:56) 30
Class 1 (Brief): PE Editors & Process Explorer (Module 2: Tools Arsenal) #6, 1 year, 6 months after release (2025-10-19 00:39:42) 30
Class 5 (Brief): Process and Network Monitoring (Module 1: Dynamic Analysis) #7, 6 months, 6 days after release (2025-10-18 23:31:29) 30
Class 3 (Lab): Sandbox Analysis (Module 1: Dynamic Analysis) #7, 1 year, 6 months after release (2025-10-18 01:07:02) 20
Class 2 (Brief): Analysis Lab & Tools (Module 1: Dynamic Analysis) #7, 1 year, 7 months after release (2025-10-18 01:03:11) 20
Class 1 (Brief): Malicious Software 101 (Module 1: Dynamic Analysis) #7, 1 year, 7 months after release (2025-10-18 00:50:33) 20
Class 5 (Lab): Windows Binaries Example (Module 0: Windows Binaries) #7, 1 year, 6 months after release (2025-10-18 00:31:41) 10
Class 4 (Brief): .NET Assemblies (Module 0: Windows Binaries) #9, 1 year, 7 months after release (2025-10-17 23:56:48) 10
Class 3 (Brief): Windows Loader (Module 0: Windows Binaries) #10, 1 year, 7 months after release (2025-10-17 23:37:23) 10
Class 2 (Brief): Windows Executables Format (Module 0: Windows Binaries) #10, 1 year, 7 months after release (2025-10-17 23:27:55) 10
Class 1 (Brief): Compiling & Building Executables (Module 0: Windows Binaries) #11, 1 year, 6 months after release (2025-10-17 23:05:06) 10