Module 0: Windows Binaries, 50 / 50 (100%)
100% complete
Module 1: Dynamic Analysis, 110 / 110 (100%)
100% complete
Module 2: Tools Arsenal, 309 / 309 (100%)
100% complete
Module 3: Reverse Engineering, 708 / 708 (100%)
100% complete
Module 4: Packers & Obfuscators, 519 / 519 (100%)
100% complete
Module 5: Aniti-Malware Tricks, 507 / 507 (100%)
100% complete
Module 6: Process Injection, 585 / 585 (100%)
100% complete
Module 7: .NET Reversing, 255 / 1,427 (18%)
17.869656622285% complete
Module 8: Dissecting Infostealers like a BOSS, 0 / 903 (0%)
0% complete
Module 9: Fighting Ransomware, 0 / 880 (0%)
0% complete
Total: 3,043 / 5,998 (50.7%)
Challenge Solved Points
Class 1.2 (Chall) FindMethod by Name (Module 7: .NET Reversing) #9, 8 months, 19 days after release (2026-04-08 12:39:24) 90
Class 1.1 (Chall) FindMethod by ID (Module 7: .NET Reversing) #9, 8 months, 19 days after release (2026-04-08 11:42:42) 85
Class 1 (Lab): Reflection 101 (Module 7: .NET Reversing) #9, 1 year, 11 months after release (2026-04-08 10:34:16) 80
Class 5 (Chall): Intercept the Shellcode (Module 6: Process Injection) #11, 7 months, 21 days after release (2026-04-07 12:58:06) 100
Class 4 (Chall): Find the Shellcode (Module 6: Process Injection) #11, 9 months, 9 days after release (2026-04-05 12:44:47) 95
Class 3.1 (Lab): Fighting Process Injection with x32dbg (Module 6: Process Injection) #10, 6 months, 7 days after release (2026-04-05 06:17:23) 85
Class 3 (Chall): Find the Window (Module 6: Process Injection) #11, 9 months, 9 days after release (2026-04-05 05:46:01) 80
Class 2.1 (Lab): SetThreadContext Technique (Module 6: Process Injection) #12, 1 year, 11 months after release (2026-04-04 02:49:32) 75
Class 4 (Lab): Anti-Debugging Ticks (Module 5: Aniti-Malware Tricks) #10, 1 year, 11 months after release (2026-04-02 10:32:35) 71
Class 1 (Lab): CreateRemoteThread Technique (Module 6: Process Injection) #11, 1 year, 11 months after release (2026-04-02 09:03:34) 75
Class 2 (Lab): SetThreadContext Technique (Module 6: Process Injection) #11, 1 year, 11 months after release (2026-04-01 16:35:56) 75
Class 5 (Lab): Anti-Malware Ticks (Module 5: Aniti-Malware Tricks) #10, 1 year, 11 months after release (2026-03-31 12:08:37) 78
Class 4.2 (Chall): Find the Offset (Module 5: Aniti-Malware Tricks) #10, 9 months, 7 days after release (2026-03-31 09:03:16) 76
Class 4.1 (Chall): Patch the Binary (Module 5: Aniti-Malware Tricks) #10, 9 months, 7 days after release (2026-03-29 20:37:31) 75
Class 3 (Brief): Process Injection (Module 5: Aniti-Malware Tricks) #11, 1 year, 11 months after release (2026-03-29 10:41:50) 70
Class 2 (Brief): Anti-VM and Packers (Module 5: Aniti-Malware Tricks) #11, 2 years, 1 month after release (2026-03-28 23:51:13) 69
Class 1 (Brief): Anti-Debugging (Module 5: Aniti-Malware Tricks) #11, 2 years, 1 month after release (2026-03-28 23:05:32) 68
Class 6 (Chall): Unpacking for Flag (Module 4: Packers & Obfuscators) #10, 10 months, 2 days after release (2026-03-28 14:19:09) 75
Class 5 (Chall): Unpacking UPX your way (Module 4: Packers & Obfuscators) #10, 10 months, 2 days after release (2026-03-28 10:21:14) 65
Class 4.2 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #11, 10 months, 1 day after release (2026-03-28 07:36:52) 57
Class 4.1 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #11, 1 year, 11 months after release (2026-03-28 07:20:48) 56
Class 4 (Lab): Unpacking ASPack (Module 4: Packers & Obfuscators) #11, 1 year, 11 months after release (2026-03-25 06:09:47) 56
Class 3.1 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #10, 1 year, 11 months after release (2026-03-24 18:20:46) 55
Class 3 (Lab): Unpacking UPX (Module 4: Packers & Obfuscators) #10, 1 year, 11 months after release (2026-03-24 17:15:43) 55
Class 2 (Brief):Unpacking & Deobfuscation Strategy (Module 4: Packers & Obfuscators) #12, 2 years, 1 month after release (2026-03-24 10:50:43) 50
Class 1 (Brief): Carnita Methodology (Module 4: Packers & Obfuscators) #13, 2 years, 1 month after release (2026-03-23 13:24:38) 50
Class 5 (Lab): Find the Password (Module 3: Reverse Engineering) #11, 1 year, 10 months after release (2026-03-23 07:44:50) 67
Class 5.1 (Lab): Find the Password (Module 3: Reverse Engineering) #11, 1 year, 10 months after release (2026-03-23 07:43:45) 68
Class 6 (Chall): G0T Password? (Module 3: Reverse Engineering) #10, 9 months, 28 days after release (2026-03-23 07:42:21) 75
Class 4.2 (Chall): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #10, 9 months, 27 days after release (2026-03-23 07:21:19) 66
Class 4.1 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #11, 1 year, 10 months after release (2026-03-23 06:18:12) 65
Class 4 (Lab): Windows 32-bit Calling Convention (Module 3: Reverse Engineering) #11, 1 year, 10 months after release (2026-03-23 01:52:24) 65
Class 3.2 (Chall): Calling Conventions (Module 3: Reverse Engineering) #11, 9 months, 27 days after release (2026-03-23 00:24:42) 61
Class 3.1 (Chall): Calling Conventions (Module 3: Reverse Engineering) #12, 9 months, 27 days after release (2026-03-23 00:17:58) 61
Class 3 (Brief): Calling Conventions (Module 3: Reverse Engineering) #13, 2 years, 1 month after release (2026-03-22 10:49:54) 60
Class 2 (Brief): Assembly Operands (Module 3: Reverse Engineering) #12, 2 years, 1 month after release (2026-03-22 10:18:10) 60
Class 1 (Brief): Disassembler Process (Module 3: Reverse Engineering) #13, 2 years, 1 month after release (2026-03-22 09:56:29) 60
Class 5.2 (Lab): Inetsim 101 (Module 2: Tools Arsenal) #16, 10 months, 17 days after release (2026-03-22 03:24:24) 46
Class 5.1 (Lab): Fakenet 101 (Module 2: Tools Arsenal) #17, 10 months, 17 days after release (2026-03-22 03:17:16) 46
Class 5 (Lab): Wireshark 101 (Module 2: Tools Arsenal) #17, 10 months, 17 days after release (2026-03-22 02:42:10) 46
Class 4.1 (Chall): Debuggers & Disassemblers (Module 2: Tools Arsenal) #16, 9 months, 26 days after release (2026-03-22 02:11:16) 41
Class 3 (Chall): PE Editors Exercise (Module 2: Tools Arsenal) #17, 1 year, 11 months after release (2026-03-22 01:28:01) 30
Class 4 (Lab): Debuggers & Disassemblers (Module 2: Tools Arsenal) #14, 1 year, 11 months after release (2026-03-21 07:33:21) 40
Class 2 (Brief): WinDbg, IDA Pro & Qilinq (Module 2: Tools Arsenal) #16, 1 year, 11 months after release (2026-03-21 07:18:23) 30
Class 1 (Brief): PE Editors & Process Explorer (Module 2: Tools Arsenal) #16, 1 year, 11 months after release (2026-03-21 07:13:44) 30
Class 4 (Lab): Analysis Inside a Virtual Machine (Module 1: Dynamic Analysis) #18, 1 year, 11 months after release (2026-03-21 06:39:14) 20
Class 5 (Brief): Process and Network Monitoring (Module 1: Dynamic Analysis) #18, 11 months, 6 days after release (2026-03-21 06:30:26) 30
Class 3 (Lab): Sandbox Analysis (Module 1: Dynamic Analysis) #18, 1 year, 11 months after release (2026-03-21 06:12:20) 20
Class 2 (Brief): Analysis Lab & Tools (Module 1: Dynamic Analysis) #19, 2 years after release (2026-03-21 06:03:28) 20
Class 1 (Brief): Malicious Software 101 (Module 1: Dynamic Analysis) #19, 2 years after release (2026-03-21 04:19:33) 20
Class 2 (Brief): Windows Executables Format (Module 0: Windows Binaries) #29, 2 years after release (2026-03-20 16:30:55) 10
Class 5 (Lab): Windows Binaries Example (Module 0: Windows Binaries) #20, 1 year, 11 months after release (2026-03-20 16:08:14) 10
Class 4 (Brief): .NET Assemblies (Module 0: Windows Binaries) #25, 2 years after release (2026-03-20 16:04:33) 10
Class 3 (Brief): Windows Loader (Module 0: Windows Binaries) #26, 2 years after release (2026-03-20 16:01:02) 10
Class 1 (Brief): Compiling & Building Executables (Module 0: Windows Binaries) #35, 1 year, 11 months after release (2026-03-20 15:41:15) 10