|
Class 1.2 (Chall) FindMethod by Name
(Module 7: .NET Reversing)
|
#9,
8 months, 19 days after release (2026-04-08 12:39:24)
|
90 |
|
Class 1.1 (Chall) FindMethod by ID
(Module 7: .NET Reversing)
|
#9,
8 months, 19 days after release (2026-04-08 11:42:42)
|
85 |
|
Class 1 (Lab): Reflection 101
(Module 7: .NET Reversing)
|
#9,
1 year, 11 months after release (2026-04-08 10:34:16)
|
80 |
|
Class 5 (Chall): Intercept the Shellcode
(Module 6: Process Injection)
|
#11,
7 months, 21 days after release (2026-04-07 12:58:06)
|
100 |
|
Class 4 (Chall): Find the Shellcode
(Module 6: Process Injection)
|
#11,
9 months, 9 days after release (2026-04-05 12:44:47)
|
95 |
|
Class 3.1 (Lab): Fighting Process Injection with x32dbg
(Module 6: Process Injection)
|
#10,
6 months, 7 days after release (2026-04-05 06:17:23)
|
85 |
|
Class 3 (Chall): Find the Window
(Module 6: Process Injection)
|
#11,
9 months, 9 days after release (2026-04-05 05:46:01)
|
80 |
|
Class 2.1 (Lab): SetThreadContext Technique
(Module 6: Process Injection)
|
#12,
1 year, 11 months after release (2026-04-04 02:49:32)
|
75 |
|
Class 4 (Lab): Anti-Debugging Ticks
(Module 5: Aniti-Malware Tricks)
|
#10,
1 year, 11 months after release (2026-04-02 10:32:35)
|
71 |
|
Class 1 (Lab): CreateRemoteThread Technique
(Module 6: Process Injection)
|
#11,
1 year, 11 months after release (2026-04-02 09:03:34)
|
75 |
|
Class 2 (Lab): SetThreadContext Technique
(Module 6: Process Injection)
|
#11,
1 year, 11 months after release (2026-04-01 16:35:56)
|
75 |
|
Class 5 (Lab): Anti-Malware Ticks
(Module 5: Aniti-Malware Tricks)
|
#10,
1 year, 11 months after release (2026-03-31 12:08:37)
|
78 |
|
Class 4.2 (Chall): Find the Offset
(Module 5: Aniti-Malware Tricks)
|
#10,
9 months, 7 days after release (2026-03-31 09:03:16)
|
76 |
|
Class 4.1 (Chall): Patch the Binary
(Module 5: Aniti-Malware Tricks)
|
#10,
9 months, 7 days after release (2026-03-29 20:37:31)
|
75 |
|
Class 3 (Brief): Process Injection
(Module 5: Aniti-Malware Tricks)
|
#11,
1 year, 11 months after release (2026-03-29 10:41:50)
|
70 |
|
Class 2 (Brief): Anti-VM and Packers
(Module 5: Aniti-Malware Tricks)
|
#11,
2 years, 1 month after release (2026-03-28 23:51:13)
|
69 |
|
Class 1 (Brief): Anti-Debugging
(Module 5: Aniti-Malware Tricks)
|
#11,
2 years, 1 month after release (2026-03-28 23:05:32)
|
68 |
|
Class 6 (Chall): Unpacking for Flag
(Module 4: Packers & Obfuscators)
|
#10,
10 months, 2 days after release (2026-03-28 14:19:09)
|
75 |
|
Class 5 (Chall): Unpacking UPX your way
(Module 4: Packers & Obfuscators)
|
#10,
10 months, 2 days after release (2026-03-28 10:21:14)
|
65 |
|
Class 4.2 (Lab): Unpacking ASPack
(Module 4: Packers & Obfuscators)
|
#11,
10 months, 1 day after release (2026-03-28 07:36:52)
|
57 |
|
Class 4.1 (Lab): Unpacking ASPack
(Module 4: Packers & Obfuscators)
|
#11,
1 year, 11 months after release (2026-03-28 07:20:48)
|
56 |
|
Class 4 (Lab): Unpacking ASPack
(Module 4: Packers & Obfuscators)
|
#11,
1 year, 11 months after release (2026-03-25 06:09:47)
|
56 |
|
Class 3.1 (Lab): Unpacking UPX
(Module 4: Packers & Obfuscators)
|
#10,
1 year, 11 months after release (2026-03-24 18:20:46)
|
55 |
|
Class 3 (Lab): Unpacking UPX
(Module 4: Packers & Obfuscators)
|
#10,
1 year, 11 months after release (2026-03-24 17:15:43)
|
55 |
|
Class 2 (Brief):Unpacking & Deobfuscation Strategy
(Module 4: Packers & Obfuscators)
|
#12,
2 years, 1 month after release (2026-03-24 10:50:43)
|
50 |
|
Class 1 (Brief): Carnita Methodology
(Module 4: Packers & Obfuscators)
|
#13,
2 years, 1 month after release (2026-03-23 13:24:38)
|
50 |
|
Class 5 (Lab): Find the Password
(Module 3: Reverse Engineering)
|
#11,
1 year, 10 months after release (2026-03-23 07:44:50)
|
67 |
|
Class 5.1 (Lab): Find the Password
(Module 3: Reverse Engineering)
|
#11,
1 year, 10 months after release (2026-03-23 07:43:45)
|
68 |
|
Class 6 (Chall): G0T Password?
(Module 3: Reverse Engineering)
|
#10,
9 months, 28 days after release (2026-03-23 07:42:21)
|
75 |
|
Class 4.2 (Chall): Windows 32-bit Calling Convention
(Module 3: Reverse Engineering)
|
#10,
9 months, 27 days after release (2026-03-23 07:21:19)
|
66 |
|
Class 4.1 (Lab): Windows 32-bit Calling Convention
(Module 3: Reverse Engineering)
|
#11,
1 year, 10 months after release (2026-03-23 06:18:12)
|
65 |
|
Class 4 (Lab): Windows 32-bit Calling Convention
(Module 3: Reverse Engineering)
|
#11,
1 year, 10 months after release (2026-03-23 01:52:24)
|
65 |
|
Class 3.2 (Chall): Calling Conventions
(Module 3: Reverse Engineering)
|
#11,
9 months, 27 days after release (2026-03-23 00:24:42)
|
61 |
|
Class 3.1 (Chall): Calling Conventions
(Module 3: Reverse Engineering)
|
#12,
9 months, 27 days after release (2026-03-23 00:17:58)
|
61 |
|
Class 3 (Brief): Calling Conventions
(Module 3: Reverse Engineering)
|
#13,
2 years, 1 month after release (2026-03-22 10:49:54)
|
60 |
|
Class 2 (Brief): Assembly Operands
(Module 3: Reverse Engineering)
|
#12,
2 years, 1 month after release (2026-03-22 10:18:10)
|
60 |
|
Class 1 (Brief): Disassembler Process
(Module 3: Reverse Engineering)
|
#13,
2 years, 1 month after release (2026-03-22 09:56:29)
|
60 |
|
Class 5.2 (Lab): Inetsim 101
(Module 2: Tools Arsenal)
|
#16,
10 months, 17 days after release (2026-03-22 03:24:24)
|
46 |
|
Class 5.1 (Lab): Fakenet 101
(Module 2: Tools Arsenal)
|
#17,
10 months, 17 days after release (2026-03-22 03:17:16)
|
46 |
|
Class 5 (Lab): Wireshark 101
(Module 2: Tools Arsenal)
|
#17,
10 months, 17 days after release (2026-03-22 02:42:10)
|
46 |
|
Class 4.1 (Chall): Debuggers & Disassemblers
(Module 2: Tools Arsenal)
|
#16,
9 months, 26 days after release (2026-03-22 02:11:16)
|
41 |
|
Class 3 (Chall): PE Editors Exercise
(Module 2: Tools Arsenal)
|
#17,
1 year, 11 months after release (2026-03-22 01:28:01)
|
30 |
|
Class 4 (Lab): Debuggers & Disassemblers
(Module 2: Tools Arsenal)
|
#14,
1 year, 11 months after release (2026-03-21 07:33:21)
|
40 |
|
Class 2 (Brief): WinDbg, IDA Pro & Qilinq
(Module 2: Tools Arsenal)
|
#16,
1 year, 11 months after release (2026-03-21 07:18:23)
|
30 |
|
Class 1 (Brief): PE Editors & Process Explorer
(Module 2: Tools Arsenal)
|
#16,
1 year, 11 months after release (2026-03-21 07:13:44)
|
30 |
|
Class 4 (Lab): Analysis Inside a Virtual Machine
(Module 1: Dynamic Analysis)
|
#18,
1 year, 11 months after release (2026-03-21 06:39:14)
|
20 |
|
Class 5 (Brief): Process and Network Monitoring
(Module 1: Dynamic Analysis)
|
#18,
11 months, 6 days after release (2026-03-21 06:30:26)
|
30 |
|
Class 3 (Lab): Sandbox Analysis
(Module 1: Dynamic Analysis)
|
#18,
1 year, 11 months after release (2026-03-21 06:12:20)
|
20 |
|
Class 2 (Brief): Analysis Lab & Tools
(Module 1: Dynamic Analysis)
|
#19,
2 years after release (2026-03-21 06:03:28)
|
20 |
|
Class 1 (Brief): Malicious Software 101
(Module 1: Dynamic Analysis)
|
#19,
2 years after release (2026-03-21 04:19:33)
|
20 |
|
Class 2 (Brief): Windows Executables Format
(Module 0: Windows Binaries)
|
#29,
2 years after release (2026-03-20 16:30:55)
|
10 |
|
Class 5 (Lab): Windows Binaries Example
(Module 0: Windows Binaries)
|
#20,
1 year, 11 months after release (2026-03-20 16:08:14)
|
10 |
|
Class 4 (Brief): .NET Assemblies
(Module 0: Windows Binaries)
|
#25,
2 years after release (2026-03-20 16:04:33)
|
10 |
|
Class 3 (Brief): Windows Loader
(Module 0: Windows Binaries)
|
#26,
2 years after release (2026-03-20 16:01:02)
|
10 |
|
Class 1 (Brief): Compiling & Building Executables
(Module 0: Windows Binaries)
|
#35,
1 year, 11 months after release (2026-03-20 15:41:15)
|
10 |