|
Class 6 (Chall): Recovering Encrypted Machine
(Module 9: Fighting Ransomware)
|
#4,
9 months, 12 days after release (2026-02-14 13:15:45)
|
200 |
|
Class 5 (Chall): Restoring Locked Keyboard
(Module 9: Fighting Ransomware)
|
#4,
9 months, 11 days after release (2026-02-13 12:29:01)
|
130 |
|
Class 4.1 (Lab): Recovering Ryuk Files with NeZa
(Module 9: Fighting Ransomware)
|
#5,
8 months, 3 days after release (2026-02-13 12:00:32)
|
120 |
|
Class 4 (Lab): Reversing Ryuk Ransomware with IDA
(Module 9: Fighting Ransomware)
|
#5,
1 year, 4 months after release (2026-02-13 11:45:45)
|
120 |
|
Class 3 (Lab): Unhooking a locked machine with NeZa
(Module 9: Fighting Ransomware)
|
#5,
1 year, 4 months after release (2026-02-12 06:41:11)
|
110 |
|
Class 2 (Lab): Intercepting AES key with NeZa
(Module 9: Fighting Ransomware)
|
#5,
1 year, 4 months after release (2026-02-11 12:45:28)
|
100 |
|
Class 1 (Lab): Intercepting RSA key with NeZa
(Module 9: Fighting Ransomware)
|
#5,
1 year, 4 months after release (2026-02-11 12:38:44)
|
100 |
|
Class 5.1 (Chall): Dissecting the Plugin
(Module 8: Dissecting Infostealers like a BOSS)
|
#5,
1 year, 4 months after release (2026-02-11 10:33:03)
|
150 |
|
Class 5 (Chall): Dissecting Infostealer
(Module 8: Dissecting Infostealers like a BOSS)
|
#5,
1 year, 4 months after release (2026-02-10 12:19:40)
|
120 |
|
Class 4.2 (Lab): Dissecting JavaScript Chrome Extension
(Module 8: Dissecting Infostealers like a BOSS)
|
#5,
8 months, 17 days after release (2026-02-10 11:59:26)
|
91 |
|
Class 4.1 (Lab): Dissecting JavaScript Chrome Extension
(Module 8: Dissecting Infostealers like a BOSS)
|
#5,
8 months, 17 days after release (2026-02-10 11:53:46)
|
91 |
|
Class 4 (Lab): Dissecting JavaScript Chrome Extension
(Module 8: Dissecting Infostealers like a BOSS)
|
#5,
1 year, 4 months after release (2026-02-10 11:52:57)
|
91 |
|
Class 3.1 (Lab): Dissecting Powershell Dropper
(Module 8: Dissecting Infostealers like a BOSS)
|
#5,
8 months, 17 days after release (2026-02-10 11:37:12)
|
90 |
|
Class 3 (Lab): Dissecting Powershell Dropper with NeZa
(Module 8: Dissecting Infostealers like a BOSS)
|
#5,
1 year, 4 months after release (2026-02-10 11:24:58)
|
90 |
|
Class 2 (Lab): Dissecting BAT Downloader
(Module 8: Dissecting Infostealers like a BOSS)
|
#5,
1 year, 4 months after release (2026-02-10 07:09:52)
|
90 |
|
Class 1 (Lab): Scripts 101
(Module 8: Dissecting Infostealers like a BOSS)
|
#5,
1 year, 4 months after release (2026-02-10 06:17:21)
|
90 |
|
Class 4.5 (Chall): Find the Keylogger Actor
(Module 7: .NET Reversing)
|
#5,
3 months, 22 days after release (2026-02-09 10:55:57)
|
210 |
|
Class 4.4 (Lab): Finding & Automating the Decryption of Third Stage
(Module 7: .NET Reversing)
|
#6,
1 year, 9 months after release (2026-02-09 10:32:42)
|
200 |
|
Class 4.3 (Chall): Found the Parent
(Module 7: .NET Reversing)
|
#6,
4 months, 2 days after release (2026-02-09 09:51:52)
|
125 |
|
Class 4.2 (Lab): Finding Second Stage Entry Point
(Module 7: .NET Reversing)
|
#6,
1 year, 9 months after release (2026-02-09 09:50:13)
|
115 |
|
Class 4.1.2 (Lab): WinDBG SOS Update
(Module 7: .NET Reversing)
|
#6,
4 months, 2 days after release (2026-02-09 07:02:51)
|
112 |
|
Class 4.1 (Lab): Introducing WinDbg SOS Plugin
(Module 7: .NET Reversing)
|
#6,
1 year, 9 months after release (2026-02-09 06:50:12)
|
110 |
|
Class 4 (Lab): Limitations of DnSpy
(Module 7: .NET Reversing)
|
#6,
1 year, 9 months after release (2026-02-07 13:31:25)
|
105 |
|
Class 3 (Lab): Patching Binary for Dumping
(Module 7: .NET Reversing)
|
#6,
1 year, 9 months after release (2026-02-07 12:36:22)
|
100 |
|
Class 2 (Lab): Deobfuscating Stage1 from Resources
(Module 7: .NET Reversing)
|
#6,
1 year, 9 months after release (2026-02-07 12:11:03)
|
95 |
|
Class 1.2 (Chall) FindMethod by Name
(Module 7: .NET Reversing)
|
#6,
6 months, 21 days after release (2026-02-07 11:32:49)
|
90 |
|
Class 1.1 (Chall) FindMethod by ID
(Module 7: .NET Reversing)
|
#6,
6 months, 21 days after release (2026-02-07 11:19:17)
|
85 |
|
Class 1 (Lab): Reflection 101
(Module 7: .NET Reversing)
|
#6,
1 year, 9 months after release (2026-02-07 11:14:41)
|
80 |
|
Class 5 (Chall): Intercept the Shellcode
(Module 6: Process Injection)
|
#7,
5 months, 23 days after release (2026-02-07 11:06:07)
|
100 |
|
Class 4 (Chall): Find the Shellcode
(Module 6: Process Injection)
|
#7,
7 months, 6 days after release (2026-01-31 15:19:30)
|
95 |
|
Class 3.1 (Lab): Fighting Process Injection with x32dbg
(Module 6: Process Injection)
|
#7,
4 months, 3 days after release (2026-01-30 13:35:32)
|
85 |
|
Class 3 (Chall): Find the Window
(Module 6: Process Injection)
|
#7,
7 months, 5 days after release (2026-01-30 13:22:28)
|
80 |
|
Class 2.1 (Lab): SetThreadContext Technique
(Module 6: Process Injection)
|
#9,
1 year, 9 months after release (2026-01-30 13:09:39)
|
75 |
|
Class 2 (Lab): SetThreadContext Technique
(Module 6: Process Injection)
|
#8,
1 year, 9 months after release (2026-01-30 11:01:24)
|
75 |
|
Class 1 (Lab): CreateRemoteThread Technique
(Module 6: Process Injection)
|
#8,
1 year, 9 months after release (2026-01-30 09:10:42)
|
75 |
|
Class 5 (Lab): Anti-Malware Ticks
(Module 5: Aniti-Malware Tricks)
|
#6,
1 year, 9 months after release (2026-01-29 16:24:41)
|
78 |
|
Class 4.2 (Chall): Find the Offset
(Module 5: Aniti-Malware Tricks)
|
#7,
7 months, 7 days after release (2026-01-29 15:00:31)
|
76 |
|
Class 4.1 (Chall): Patch the Binary
(Module 5: Aniti-Malware Tricks)
|
#7,
7 months, 9 days after release (2026-01-29 14:50:37)
|
75 |
|
Class 4 (Lab): Anti-Debugging Ticks
(Module 5: Aniti-Malware Tricks)
|
#7,
1 year, 9 months after release (2026-01-29 14:45:50)
|
71 |
|
Class 3 (Brief): Process Injection
(Module 5: Aniti-Malware Tricks)
|
#8,
1 year, 9 months after release (2026-01-28 15:43:56)
|
70 |
|
Class 2 (Brief): Anti-VM and Packers
(Module 5: Aniti-Malware Tricks)
|
#8,
1 year, 11 months after release (2026-01-28 12:23:29)
|
69 |
|
Class 1 (Brief): Anti-Debugging
(Module 5: Aniti-Malware Tricks)
|
#8,
1 year, 11 months after release (2026-01-28 12:08:17)
|
68 |
|
Class 6 (Chall): Unpacking for Flag
(Module 4: Packers & Obfuscators)
|
#7,
8 months, 4 days after release (2026-01-28 11:54:11)
|
75 |
|
Class 5 (Chall): Unpacking UPX your way
(Module 4: Packers & Obfuscators)
|
#7,
8 months, 4 days after release (2026-01-28 11:25:05)
|
65 |
|
Class 4.2 (Lab): Unpacking ASPack
(Module 4: Packers & Obfuscators)
|
#8,
7 months, 28 days after release (2026-01-21 12:04:30)
|
57 |
|
Class 4.1 (Lab): Unpacking ASPack
(Module 4: Packers & Obfuscators)
|
#8,
1 year, 9 months after release (2026-01-21 11:47:02)
|
56 |
|
Class 4 (Lab): Unpacking ASPack
(Module 4: Packers & Obfuscators)
|
#8,
1 year, 9 months after release (2026-01-21 11:28:06)
|
56 |
|
Class 3.1 (Lab): Unpacking UPX
(Module 4: Packers & Obfuscators)
|
#8,
1 year, 9 months after release (2026-01-21 04:58:23)
|
55 |
|
Class 3 (Lab): Unpacking UPX
(Module 4: Packers & Obfuscators)
|
#7,
1 year, 9 months after release (2026-01-20 12:22:38)
|
55 |
|
Class 2 (Brief):Unpacking & Deobfuscation Strategy
(Module 4: Packers & Obfuscators)
|
#9,
1 year, 11 months after release (2026-01-20 11:48:48)
|
50 |
|
Class 1 (Brief): Carnita Methodology
(Module 4: Packers & Obfuscators)
|
#10,
1 year, 11 months after release (2026-01-20 11:35:54)
|
50 |
|
Class 6 (Chall): G0T Password?
(Module 3: Reverse Engineering)
|
#7,
7 months, 25 days after release (2026-01-18 11:45:21)
|
75 |
|
Class 5.1 (Lab): Find the Password
(Module 3: Reverse Engineering)
|
#8,
1 year, 8 months after release (2026-01-18 11:36:45)
|
68 |
|
Class 5 (Lab): Find the Password
(Module 3: Reverse Engineering)
|
#8,
1 year, 8 months after release (2026-01-18 11:23:51)
|
67 |
|
Class 4.2 (Chall): Windows 32-bit Calling Convention
(Module 3: Reverse Engineering)
|
#7,
7 months, 21 days after release (2026-01-15 06:51:58)
|
66 |
|
Class 4.1 (Lab): Windows 32-bit Calling Convention
(Module 3: Reverse Engineering)
|
#8,
1 year, 8 months after release (2026-01-15 06:33:58)
|
65 |
|
Class 4 (Lab): Windows 32-bit Calling Convention
(Module 3: Reverse Engineering)
|
#7,
1 year, 8 months after release (2026-01-15 06:18:53)
|
65 |
|
Class 3.2 (Chall): Calling Conventions
(Module 3: Reverse Engineering)
|
#7,
7 months, 21 days after release (2026-01-15 05:48:43)
|
61 |
|
Class 3.1 (Chall): Calling Conventions
(Module 3: Reverse Engineering)
|
#7,
7 months, 21 days after release (2026-01-15 05:46:44)
|
61 |
|
Class 3 (Brief): Calling Conventions
(Module 3: Reverse Engineering)
|
#8,
1 year, 10 months after release (2026-01-15 05:33:00)
|
60 |
|
Class 2 (Brief): Assembly Operands
(Module 3: Reverse Engineering)
|
#8,
1 year, 10 months after release (2026-01-15 04:59:59)
|
60 |
|
Class 1 (Brief): Disassembler Process
(Module 3: Reverse Engineering)
|
#9,
1 year, 10 months after release (2026-01-15 04:06:03)
|
60 |
|
Class 5.2 (Lab): Inetsim 101
(Module 2: Tools Arsenal)
|
#10,
8 months, 10 days after release (2026-01-13 11:32:11)
|
46 |
|
Class 5.1 (Lab): Fakenet 101
(Module 2: Tools Arsenal)
|
#11,
8 months, 10 days after release (2026-01-13 11:25:57)
|
46 |
|
Class 5 (Lab): Wireshark 101
(Module 2: Tools Arsenal)
|
#11,
8 months, 10 days after release (2026-01-13 11:01:16)
|
46 |
|
Class 4 (Lab): Debuggers & Disassemblers
(Module 2: Tools Arsenal)
|
#10,
1 year, 9 months after release (2026-01-13 10:42:44)
|
40 |
|
Class 4.1 (Chall): Debuggers & Disassemblers
(Module 2: Tools Arsenal)
|
#11,
7 months, 19 days after release (2026-01-13 10:38:42)
|
41 |
|
Class 3 (Chall): PE Editors Exercise
(Module 2: Tools Arsenal)
|
#12,
1 year, 9 months after release (2026-01-13 10:05:19)
|
30 |
|
Class 2 (Brief): WinDbg, IDA Pro & Qilinq
(Module 2: Tools Arsenal)
|
#12,
1 year, 9 months after release (2026-01-12 16:57:31)
|
30 |
|
Class 1 (Brief): PE Editors & Process Explorer
(Module 2: Tools Arsenal)
|
#12,
1 year, 9 months after release (2026-01-12 16:46:17)
|
30 |
|
Class 5 (Brief): Process and Network Monitoring
(Module 1: Dynamic Analysis)
|
#13,
8 months, 29 days after release (2026-01-12 16:28:02)
|
30 |
|
Class 4 (Lab): Analysis Inside a Virtual Machine
(Module 1: Dynamic Analysis)
|
#13,
1 year, 8 months after release (2026-01-09 12:10:43)
|
20 |
|
Class 3 (Lab): Sandbox Analysis
(Module 1: Dynamic Analysis)
|
#13,
1 year, 8 months after release (2026-01-09 11:27:51)
|
20 |
|
Class 2 (Brief): Analysis Lab & Tools
(Module 1: Dynamic Analysis)
|
#13,
1 year, 10 months after release (2026-01-09 11:24:05)
|
20 |
|
Class 1 (Brief): Malicious Software 101
(Module 1: Dynamic Analysis)
|
#13,
1 year, 10 months after release (2026-01-09 11:20:30)
|
20 |
|
Class 5 (Lab): Windows Binaries Example
(Module 0: Windows Binaries)
|
#13,
1 year, 8 months after release (2026-01-06 17:09:12)
|
10 |
|
Class 4 (Brief): .NET Assemblies
(Module 0: Windows Binaries)
|
#17,
1 year, 9 months after release (2025-12-12 13:59:29)
|
10 |
|
Class 3 (Brief): Windows Loader
(Module 0: Windows Binaries)
|
#18,
1 year, 9 months after release (2025-12-12 13:57:48)
|
10 |
|
Class 2 (Brief): Windows Executables Format
(Module 0: Windows Binaries)
|
#18,
1 year, 9 months after release (2025-12-12 13:55:53)
|
10 |
|
Class 1 (Brief): Compiling & Building Executables
(Module 0: Windows Binaries)
|
#22,
1 year, 8 months after release (2025-12-12 13:55:28)
|
10 |