Module 0: Windows Binaries, 50 / 50 (100%)
100% complete
Module 1: Dynamic Analysis, 110 / 110 (100%)
100% complete
Module 2: Tools Arsenal, 309 / 309 (100%)
100% complete
Module 3: Reverse Engineering, 708 / 708 (100%)
100% complete
Module 4: Packers & Obfuscators, 519 / 519 (100%)
100% complete
Module 5: Aniti-Malware Tricks, 507 / 507 (100%)
100% complete
Module 6: Process Injection, 585 / 585 (100%)
100% complete
Module 7: .NET Reversing, 1,427 / 1,427 (100%)
100% complete
Module 8: Dissecting Infostealers like a BOSS, 903 / 903 (100%)
100% complete
Module 9: Fighting Ransomware, 880 / 880 (100%)
100% complete
Total: 5,998 / 5,998 (100%)
Challenge Solved Points
Class 6 (Chall): Recovering Encrypted Machine (Module 9: Fighting Ransomware) #6, 10 months, 26 days after release (2026-03-31 05:15:01) 200
Class 5 (Chall): Restoring Locked Keyboard (Module 9: Fighting Ransomware) #6, 10 months, 26 days after release (2026-03-31 04:40:24) 130
Class 4.1 (Lab): Recovering Ryuk Files with NeZa (Module 9: Fighting Ransomware) #7, 9 months, 19 days after release (2026-03-31 04:38:32) 120
Class 4 (Lab): Reversing Ryuk Ransomware with IDA (Module 9: Fighting Ransomware) #8, 1 year, 6 months after release (2026-03-31 04:11:33) 120
Class 3 (Lab): Unhooking a locked machine with NeZa (Module 9: Fighting Ransomware) #8, 1 year, 6 months after release (2026-03-30 17:32:36) 110
Class 2 (Lab): Intercepting AES key with NeZa (Module 9: Fighting Ransomware) #8, 1 year, 6 months after release (2026-03-30 16:48:16) 100
Class 1 (Lab): Intercepting RSA key with NeZa (Module 9: Fighting Ransomware) #8, 1 year, 6 months after release (2026-03-30 16:12:36) 100
Class 5.1 (Chall): Dissecting the Plugin (Module 8: Dissecting Infostealers like a BOSS) #8, 1 year, 6 months after release (2026-03-30 15:05:54) 150
Class 5 (Chall): Dissecting Infostealer (Module 8: Dissecting Infostealers like a BOSS) #8, 1 year, 6 months after release (2026-03-30 14:42:53) 120
Class 4.2 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) #8, 10 months, 4 days after release (2026-03-30 14:30:52) 91
Class 4.1 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) #8, 10 months, 4 days after release (2026-03-30 14:25:38) 91
Class 4 (Lab): Dissecting JavaScript Chrome Extension (Module 8: Dissecting Infostealers like a BOSS) #8, 1 year, 6 months after release (2026-03-30 13:57:30) 91
Class 3.1 (Lab): Dissecting Powershell Dropper (Module 8: Dissecting Infostealers like a BOSS) #8, 10 months, 4 days after release (2026-03-30 13:42:19) 90
Class 3 (Lab): Dissecting Powershell Dropper with NeZa (Module 8: Dissecting Infostealers like a BOSS) #8, 1 year, 6 months after release (2026-03-30 13:33:49) 90
Class 2 (Lab): Dissecting BAT Downloader (Module 8: Dissecting Infostealers like a BOSS) #8, 1 year, 6 months after release (2026-03-30 06:56:58) 90
Class 1 (Lab): Scripts 101 (Module 8: Dissecting Infostealers like a BOSS) #8, 1 year, 6 months after release (2026-03-30 05:22:53) 90
Class 4.5 (Chall): Find the Keylogger Actor (Module 7: .NET Reversing) #8, 5 months, 10 days after release (2026-03-30 04:03:43) 210
Class 4.4 (Lab): Finding & Automating the Decryption of Third Stage (Module 7: .NET Reversing) #8, 1 year, 11 months after release (2026-03-30 03:46:03) 200
Class 4.3 (Chall): Found the Parent (Module 7: .NET Reversing) #8, 5 months, 20 days after release (2026-03-29 16:37:39) 125
Class 4.2 (Lab): Finding Second Stage Entry Point (Module 7: .NET Reversing) #8, 1 year, 11 months after release (2026-03-29 16:26:33) 115
Class 4.1 (Lab): Introducing WinDbg SOS Plugin (Module 7: .NET Reversing) #8, 1 year, 11 months after release (2026-03-29 15:11:41) 110
Class 4.1.2 (Lab): WinDBG SOS Update (Module 7: .NET Reversing) #8, 5 months, 19 days after release (2026-03-29 15:01:06) 112
Class 4 (Lab): Limitations of DnSpy (Module 7: .NET Reversing) #8, 1 year, 11 months after release (2026-03-29 12:46:57) 105
Class 3 (Lab): Patching Binary for Dumping (Module 7: .NET Reversing) #8, 1 year, 10 months after release (2026-03-17 09:36:05) 100
Class 2 (Lab): Deobfuscating Stage1 from Resources (Module 7: .NET Reversing) #8, 1 year, 10 months after release (2026-03-17 08:56:54) 95
Class 1.2 (Chall) FindMethod by Name (Module 7: .NET Reversing) #8, 7 months, 28 days after release (2026-03-17 08:27:19) 90
Class 1.1 (Chall) FindMethod by ID (Module 7: .NET Reversing) #8, 7 months, 28 days after release (2026-03-17 08:22:19) 85
Class 1 (Lab): Reflection 101 (Module 7: .NET Reversing) #8, 1 year, 10 months after release (2026-03-17 08:15:52) 80
Class 5 (Chall): Intercept the Shellcode (Module 6: Process Injection) #9, 7 months after release (2026-03-17 07:58:23) 100
Class 4 (Chall): Find the Shellcode (Module 6: Process Injection) #9, 8 months, 20 days after release (2026-03-17 07:42:25) 95
Class 3.1 (Lab): Fighting Process Injection with x32dbg (Module 6: Process Injection) #8, 5 months, 18 days after release (2026-03-17 07:18:18) 85
Class 3 (Chall): Find the Window (Module 6: Process Injection) #9, 8 months, 20 days after release (2026-03-17 07:08:59) 80
Class 2.1 (Lab): SetThreadContext Technique (Module 6: Process Injection) #10, 1 year, 10 months after release (2026-03-17 07:00:08) 75
Class 2 (Lab): SetThreadContext Technique (Module 6: Process Injection) #9, 1 year, 10 months after release (2026-03-17 06:25:38) 75
Class 1 (Lab): CreateRemoteThread Technique (Module 6: Process Injection) #9, 1 year, 10 months after release (2026-03-17 05:41:13) 75
Class 5 (Lab): Anti-Malware Ticks (Module 5: Aniti-Malware Tricks) #8, 1 year, 10 months after release (2026-03-16 07:14:32) 78
Class 4.2 (Chall): Find the Offset (Module 5: Aniti-Malware Tricks) #8, 8 months, 22 days after release (2026-03-16 06:45:29) 76
Class 4.1 (Chall): Patch the Binary (Module 5: Aniti-Malware Tricks) #8, 8 months, 24 days after release (2026-03-16 06:42:18) 75
Class 4 (Lab): Anti-Debugging Ticks (Module 5: Aniti-Malware Tricks) #8, 1 year, 10 months after release (2026-03-16 06:30:34) 71
Class 3 (Brief): Process Injection (Module 5: Aniti-Malware Tricks) #9, 1 year, 11 months after release (2026-03-15 13:06:13) 70
Class 2 (Brief): Anti-VM and Packers (Module 5: Aniti-Malware Tricks) #9, 2 years after release (2026-03-15 07:16:04) 69
Class 1 (Brief): Anti-Debugging (Module 5: Aniti-Malware Tricks) #9, 2 years after release (2026-03-15 06:38:36) 68
Class 6 (Chall): Unpacking for Flag (Module 4: Packers & Obfuscators) #8, 9 months, 20 days after release (2026-03-15 06:09:23) 75
Class 5 (Chall): Unpacking UPX your way (Module 4: Packers & Obfuscators) #8, 9 months, 20 days after release (2026-03-15 05:54:20) 65
Class 4.2 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #9, 9 months, 19 days after release (2026-03-14 17:08:14) 57
Class 4.1 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #9, 1 year, 10 months after release (2026-03-14 17:03:11) 56
Class 4 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #9, 1 year, 10 months after release (2026-03-14 16:42:41) 56
Class 3.1 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #9, 1 year, 10 months after release (2026-03-14 16:22:09) 55
Class 3 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #9, 1 year, 10 months after release (2026-03-14 16:11:34) 55
Class 2 (Brief):Unpacking & Deobfuscation Strategy (Module 4: Packers & Obfuscators) #11, 2 years after release (2026-03-14 15:44:27) 50
Class 1 (Brief): Carnita Methodology (Module 4: Packers & Obfuscators) #12, 2 years after release (2026-03-14 14:37:42) 50
Class 6 (Chall): G0T Password? (Module 3: Reverse Engineering) #9, 9 months, 19 days after release (2026-03-14 05:53:33) 75
Class 5.1 (Lab): Find the Password (Module 3: Reverse Engineering) #10, 1 year, 10 months after release (2026-03-14 05:53:00) 68
Class 5 (Lab): Find the Password (Module 3: Reverse Engineering) #10, 1 year, 10 months after release (2026-03-14 05:52:34) 67
Class 4.2 (Chall): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #9, 9 months, 18 days after release (2026-03-14 05:48:03) 66
Class 4.1 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #10, 1 year, 10 months after release (2026-03-14 05:44:34) 65
Class 4 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #10, 1 year, 10 months after release (2026-03-14 05:41:05) 65
Class 3.2 (Chall): Calling Conventions (Module 3: Reverse Engineering) #10, 9 months, 18 days after release (2026-03-14 05:28:35) 61
Class 3.1 (Chall): Calling Conventions (Module 3: Reverse Engineering) #10, 9 months, 18 days after release (2026-03-14 05:24:34) 61
Class 3 (Brief): Calling Conventions (Module 3: Reverse Engineering) #11, 2 years after release (2026-03-14 05:24:23) 60
Class 2 (Brief): Assembly Operands (Module 3: Reverse Engineering) #11, 2 years after release (2026-03-14 05:21:44) 60
Class 1 (Brief): Disassembler Process (Module 3: Reverse Engineering) #12, 2 years after release (2026-03-14 05:20:10) 60
Class 5.2 (Lab): Inetsim 101 (Module 2: Tools Arsenal) #14, 10 months, 9 days after release (2026-03-14 05:04:11) 46
Class 5.1 (Lab): Fakenet 101 (Module 2: Tools Arsenal) #15, 10 months, 9 days after release (2026-03-14 04:49:14) 46
Class 5 (Lab): Wireshark 101 (Module 2: Tools Arsenal) #15, 10 months, 9 days after release (2026-03-14 04:18:25) 46
Class 4.1 (Chall): Debuggers & Disassemblers (Module 2: Tools Arsenal) #14, 9 months, 18 days after release (2026-03-13 16:55:46) 41
Class 4 (Lab): Debuggers & Disassemblers (Module 2: Tools Arsenal) #13, 1 year, 10 months after release (2026-03-13 16:52:30) 40
Class 3 (Chall): PE Editors Exercise (Module 2: Tools Arsenal) #15, 1 year, 10 months after release (2026-03-13 12:12:47) 30
Class 2 (Brief): WinDbg, IDA Pro & Qilinq (Module 2: Tools Arsenal) #15, 1 year, 11 months after release (2026-03-06 08:10:14) 30
Class 1 (Brief): PE Editors & Process Explorer (Module 2: Tools Arsenal) #15, 1 year, 11 months after release (2026-03-06 07:28:27) 30
Class 5 (Brief): Process and Network Monitoring (Module 1: Dynamic Analysis) #16, 10 months, 7 days after release (2026-02-20 07:19:58) 30
Class 4 (Lab): Analysis Inside a Virtual Machine (Module 1: Dynamic Analysis) #16, 1 year, 10 months after release (2026-02-20 07:08:04) 20
Class 3 (Lab): Sandbox Analysis (Module 1: Dynamic Analysis) #16, 1 year, 10 months after release (2026-02-20 07:02:01) 20
Class 2 (Brief): Analysis Lab & Tools (Module 1: Dynamic Analysis) #16, 2 years after release (2026-02-20 06:00:55) 20
Class 1 (Brief): Malicious Software 101 (Module 1: Dynamic Analysis) #16, 2 years after release (2026-02-20 05:30:27) 20
Class 5 (Lab): Windows Binaries Example (Module 0: Windows Binaries) #16, 1 year, 10 months after release (2026-02-17 06:47:41) 10
Class 4 (Brief): .NET Assemblies (Module 0: Windows Binaries) #21, 1 year, 11 months after release (2026-02-17 06:21:11) 10
Class 3 (Brief): Windows Loader (Module 0: Windows Binaries) #22, 1 year, 11 months after release (2026-02-17 03:18:55) 10
Class 2 (Brief): Windows Executables Format (Module 0: Windows Binaries) #22, 1 year, 11 months after release (2026-02-17 03:13:05) 10
Class 1 (Brief): Compiling & Building Executables (Module 0: Windows Binaries) #28, 1 year, 10 months after release (2026-02-17 03:10:39) 10