Module 0: Windows Binaries, 50 / 50 (100%)
100% complete
Module 1: Dynamic Analysis, 110 / 110 (100%)
100% complete
Module 2: Tools Arsenal, 309 / 309 (100%)
100% complete
Module 3: Reverse Engineering, 708 / 708 (100%)
100% complete
Module 4: Packers & Obfuscators, 519 / 519 (100%)
100% complete
Module 5: Aniti-Malware Tricks, 507 / 507 (100%)
100% complete
Module 6: Process Injection, 585 / 585 (100%)
100% complete
Module 7: .NET Reversing, 1,427 / 1,427 (100%)
100% complete
Module 8: Dissecting Infostealers like a BOSS, 903 / 903 (100%)
100% complete
Module 9: Fighting Ransomware, 880 / 880 (100%)
100% complete
Total: 5,998 / 5,998 (100%)
Challenge Solved Points
Class 6 (Chall): Recovering Encrypted Machine (Module 9: Fighting Ransomware) #4, 9 months, 12 days after release (2026-02-14 13:15:45) 200
Class 5 (Chall): Restoring Locked Keyboard (Module 9: Fighting Ransomware) #4, 9 months, 11 days after release (2026-02-13 12:29:01) 130
Class 4.1 (Lab): Recovering Ryuk Files with NeZa (Module 9: Fighting Ransomware) #5, 8 months, 3 days after release (2026-02-13 12:00:32) 120
Class 4 (Lab): Reversing Ryuk Ransomware with IDA (Module 9: Fighting Ransomware) #5, 1 year, 4 months after release (2026-02-13 11:45:45) 120
Class 3 (Lab): Unhooking a locked machine with NeZa (Module 9: Fighting Ransomware) #5, 1 year, 4 months after release (2026-02-12 06:41:11) 110
Class 2 (Lab): Intercepting AES key with NeZa (Module 9: Fighting Ransomware) #5, 1 year, 4 months after release (2026-02-11 12:45:28) 100
Class 1 (Lab): Intercepting RSA key with NeZa (Module 9: Fighting Ransomware) #5, 1 year, 4 months after release (2026-02-11 12:38:44) 100
Class 5.1 (Chall): Dissecting the Plugin (Module 8: Dissecting Infostealers like a BOSS) #5, 1 year, 4 months after release (2026-02-11 10:33:03) 150
Class 5 (Chall): Dissecting Infostealer (Module 8: Dissecting Infostealers like a BOSS) #5, 1 year, 4 months after release (2026-02-10 12:19:40) 120
Class 4.2 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) #5, 8 months, 17 days after release (2026-02-10 11:59:26) 91
Class 4.1 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) #5, 8 months, 17 days after release (2026-02-10 11:53:46) 91
Class 4 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) #5, 1 year, 4 months after release (2026-02-10 11:52:57) 91
Class 3.1 (Lab): Dissecting Powershell Dropper (Module 8: Dissecting Infostealers like a BOSS) #5, 8 months, 17 days after release (2026-02-10 11:37:12) 90
Class 3 (Lab): Dissecting Powershell Dropper with NeZa (Module 8: Dissecting Infostealers like a BOSS) #5, 1 year, 4 months after release (2026-02-10 11:24:58) 90
Class 2 (Lab): Dissecting BAT Downloader (Module 8: Dissecting Infostealers like a BOSS) #5, 1 year, 4 months after release (2026-02-10 07:09:52) 90
Class 1 (Lab): Scripts 101 (Module 8: Dissecting Infostealers like a BOSS) #5, 1 year, 4 months after release (2026-02-10 06:17:21) 90
Class 4.5 (Chall): Find the Keylogger Actor (Module 7: .NET Reversing) #5, 3 months, 22 days after release (2026-02-09 10:55:57) 210
Class 4.4 (Lab): Finding & Automating the Decryption of Third Stage (Module 7: .NET Reversing) #6, 1 year, 9 months after release (2026-02-09 10:32:42) 200
Class 4.3 (Chall): Found the Parent (Module 7: .NET Reversing) #6, 4 months, 2 days after release (2026-02-09 09:51:52) 125
Class 4.2 (Lab): Finding Second Stage Entry Point (Module 7: .NET Reversing) #6, 1 year, 9 months after release (2026-02-09 09:50:13) 115
Class 4.1.2 (Lab): WinDBG SOS Update (Module 7: .NET Reversing) #6, 4 months, 2 days after release (2026-02-09 07:02:51) 112
Class 4.1 (Lab): Introducing WinDbg SOS Plugin (Module 7: .NET Reversing) #6, 1 year, 9 months after release (2026-02-09 06:50:12) 110
Class 4 (Lab): Limitations of DnSpy (Module 7: .NET Reversing) #6, 1 year, 9 months after release (2026-02-07 13:31:25) 105
Class 3 (Lab): Patching Binary for Dumping (Module 7: .NET Reversing) #6, 1 year, 9 months after release (2026-02-07 12:36:22) 100
Class 2 (Lab): Deobfuscating Stage1 from Resources (Module 7: .NET Reversing) #6, 1 year, 9 months after release (2026-02-07 12:11:03) 95
Class 1.2 (Chall) FindMethod by Name (Module 7: .NET Reversing) #6, 6 months, 21 days after release (2026-02-07 11:32:49) 90
Class 1.1 (Chall) FindMethod by ID (Module 7: .NET Reversing) #6, 6 months, 21 days after release (2026-02-07 11:19:17) 85
Class 1 (Lab): Reflection 101 (Module 7: .NET Reversing) #6, 1 year, 9 months after release (2026-02-07 11:14:41) 80
Class 5 (Chall): Intercept the Shellcode (Module 6: Process Injection) #7, 5 months, 23 days after release (2026-02-07 11:06:07) 100
Class 4 (Chall): Find the Shellcode (Module 6: Process Injection) #7, 7 months, 6 days after release (2026-01-31 15:19:30) 95
Class 3.1 (Lab): Fighting Process Injection with x32dbg (Module 6: Process Injection) #7, 4 months, 3 days after release (2026-01-30 13:35:32) 85
Class 3 (Chall): Find the Window (Module 6: Process Injection) #7, 7 months, 5 days after release (2026-01-30 13:22:28) 80
Class 2.1 (Lab): SetThreadContext Technique (Module 6: Process Injection) #9, 1 year, 9 months after release (2026-01-30 13:09:39) 75
Class 2 (Lab): SetThreadContext Technique (Module 6: Process Injection) #8, 1 year, 9 months after release (2026-01-30 11:01:24) 75
Class 1 (Lab): CreateRemoteThread Technique (Module 6: Process Injection) #8, 1 year, 9 months after release (2026-01-30 09:10:42) 75
Class 5 (Lab): Anti-Malware Ticks (Module 5: Aniti-Malware Tricks) #6, 1 year, 9 months after release (2026-01-29 16:24:41) 78
Class 4.2 (Chall): Find the Offset (Module 5: Aniti-Malware Tricks) #7, 7 months, 7 days after release (2026-01-29 15:00:31) 76
Class 4.1 (Chall): Patch the Binary (Module 5: Aniti-Malware Tricks) #7, 7 months, 9 days after release (2026-01-29 14:50:37) 75
Class 4 (Lab): Anti-Debugging Ticks (Module 5: Aniti-Malware Tricks) #7, 1 year, 9 months after release (2026-01-29 14:45:50) 71
Class 3 (Brief): Process Injection (Module 5: Aniti-Malware Tricks) #8, 1 year, 9 months after release (2026-01-28 15:43:56) 70
Class 2 (Brief): Anti-VM and Packers (Module 5: Aniti-Malware Tricks) #8, 1 year, 11 months after release (2026-01-28 12:23:29) 69
Class 1 (Brief): Anti-Debugging (Module 5: Aniti-Malware Tricks) #8, 1 year, 11 months after release (2026-01-28 12:08:17) 68
Class 6 (Chall): Unpacking for Flag (Module 4: Packers & Obfuscators) #7, 8 months, 4 days after release (2026-01-28 11:54:11) 75
Class 5 (Chall): Unpacking UPX your way (Module 4: Packers & Obfuscators) #7, 8 months, 4 days after release (2026-01-28 11:25:05) 65
Class 4.2 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #8, 7 months, 28 days after release (2026-01-21 12:04:30) 57
Class 4.1 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #8, 1 year, 9 months after release (2026-01-21 11:47:02) 56
Class 4 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #8, 1 year, 9 months after release (2026-01-21 11:28:06) 56
Class 3.1 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #8, 1 year, 9 months after release (2026-01-21 04:58:23) 55
Class 3 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #7, 1 year, 9 months after release (2026-01-20 12:22:38) 55
Class 2 (Brief):Unpacking & Deobfuscation Strategy (Module 4: Packers & Obfuscators) #9, 1 year, 11 months after release (2026-01-20 11:48:48) 50
Class 1 (Brief): Carnita Methodology (Module 4: Packers & Obfuscators) #10, 1 year, 11 months after release (2026-01-20 11:35:54) 50
Class 6 (Chall): G0T Password? (Module 3: Reverse Engineering) #7, 7 months, 25 days after release (2026-01-18 11:45:21) 75
Class 5.1 (Lab): Find the Password (Module 3: Reverse Engineering) #8, 1 year, 8 months after release (2026-01-18 11:36:45) 68
Class 5 (Lab): Find the Password (Module 3: Reverse Engineering) #8, 1 year, 8 months after release (2026-01-18 11:23:51) 67
Class 4.2 (Chall): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #7, 7 months, 21 days after release (2026-01-15 06:51:58) 66
Class 4.1 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #8, 1 year, 8 months after release (2026-01-15 06:33:58) 65
Class 4 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #7, 1 year, 8 months after release (2026-01-15 06:18:53) 65
Class 3.2 (Chall): Calling Conventions (Module 3: Reverse Engineering) #7, 7 months, 21 days after release (2026-01-15 05:48:43) 61
Class 3.1 (Chall): Calling Conventions (Module 3: Reverse Engineering) #7, 7 months, 21 days after release (2026-01-15 05:46:44) 61
Class 3 (Brief): Calling Conventions (Module 3: Reverse Engineering) #8, 1 year, 10 months after release (2026-01-15 05:33:00) 60
Class 2 (Brief): Assembly Operands (Module 3: Reverse Engineering) #8, 1 year, 10 months after release (2026-01-15 04:59:59) 60
Class 1 (Brief): Disassembler Process (Module 3: Reverse Engineering) #9, 1 year, 10 months after release (2026-01-15 04:06:03) 60
Class 5.2 (Lab): Inetsim 101 (Module 2: Tools Arsenal) #10, 8 months, 10 days after release (2026-01-13 11:32:11) 46
Class 5.1 (Lab): Fakenet 101 (Module 2: Tools Arsenal) #11, 8 months, 10 days after release (2026-01-13 11:25:57) 46
Class 5 (Lab): Wireshark 101 (Module 2: Tools Arsenal) #11, 8 months, 10 days after release (2026-01-13 11:01:16) 46
Class 4 (Lab): Debuggers & Disassemblers (Module 2: Tools Arsenal) #10, 1 year, 9 months after release (2026-01-13 10:42:44) 40
Class 4.1 (Chall): Debuggers & Disassemblers (Module 2: Tools Arsenal) #11, 7 months, 19 days after release (2026-01-13 10:38:42) 41
Class 3 (Chall): PE Editors Exercise (Module 2: Tools Arsenal) #12, 1 year, 9 months after release (2026-01-13 10:05:19) 30
Class 2 (Brief): WinDbg, IDA Pro & Qilinq (Module 2: Tools Arsenal) #12, 1 year, 9 months after release (2026-01-12 16:57:31) 30
Class 1 (Brief): PE Editors & Process Explorer (Module 2: Tools Arsenal) #12, 1 year, 9 months after release (2026-01-12 16:46:17) 30
Class 5 (Brief): Process and Network Monitoring (Module 1: Dynamic Analysis) #13, 8 months, 29 days after release (2026-01-12 16:28:02) 30
Class 4 (Lab): Analysis Inside a Virtual Machine (Module 1: Dynamic Analysis) #13, 1 year, 8 months after release (2026-01-09 12:10:43) 20
Class 3 (Lab): Sandbox Analysis (Module 1: Dynamic Analysis) #13, 1 year, 8 months after release (2026-01-09 11:27:51) 20
Class 2 (Brief): Analysis Lab & Tools (Module 1: Dynamic Analysis) #13, 1 year, 10 months after release (2026-01-09 11:24:05) 20
Class 1 (Brief): Malicious Software 101 (Module 1: Dynamic Analysis) #13, 1 year, 10 months after release (2026-01-09 11:20:30) 20
Class 5 (Lab): Windows Binaries Example (Module 0: Windows Binaries) #13, 1 year, 8 months after release (2026-01-06 17:09:12) 10
Class 4 (Brief): .NET Assemblies (Module 0: Windows Binaries) #17, 1 year, 9 months after release (2025-12-12 13:59:29) 10
Class 3 (Brief): Windows Loader (Module 0: Windows Binaries) #18, 1 year, 9 months after release (2025-12-12 13:57:48) 10
Class 2 (Brief): Windows Executables Format (Module 0: Windows Binaries) #18, 1 year, 9 months after release (2025-12-12 13:55:53) 10
Class 1 (Brief): Compiling & Building Executables (Module 0: Windows Binaries) #22, 1 year, 8 months after release (2025-12-12 13:55:28) 10