Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
FakeGPT
Malware Analysis
easyAnalyze a malicious Chrome extension's code and behavior to identify data theft mechanisms, covert exfiltration via `<img>` tags, and anti-analysis techniques.
XWorm
Malware Analysis
mediumAnalyze malware behavior to identify persistence methods, evasion techniques, and C2 infrastructure by extracting artifacts and configuration data from static and dynamic analysis.
GetPDF
Malware Analysis
mediumReconstruct a multi-stage PDF malware attack by analyzing network traffic, dissecting PDF objects, deobfuscating JavaScript, and emulating shellcode to identify payloads and exploited CVEs.
Obfuscated
Malware Analysis
mediumDeobfuscate multi-stage VBA and JavaScript malware from a Word document, extracting IOCs and reconstructing execution flow with Oledump, CyberChef, and WSH.
Emprisa Maldoc
Malware Analysis
mediumReconstruct fragmented shellcode from a malicious RTF document and emulate its execution using `rtfdump.py` and `scdbg` to identify CVE-2017-11882 payload delivery.
XLM Macros
Malware Analysis
mediumAnalyze Excel 4.0 macros using XLMDeobfuscator and OLEDUMP to identify anti-analysis techniques and subsequent stage download attempts.
MalDoc101
Malware Analysis
mediumAnalyze obfuscated scripts to identify malicious infrastructure, specifically extracting the first FQDN used to download a trojan, enhancing skills in threat hunting and incident response.
RE101
Malware Analysis
mediumAnalyze diverse file types including binaries, obfuscated scripts, and corrupted archives using tools like Cutter, hex editors, and debuggers to extract hidden flags and reverse custom encryption.
RotaJakiro
Malware Analysis
hardReverse engineer and analyze RotaJakiro Linux malware using Ghidra, strace, and Wireshark to identify persistence, anti-analysis, and C2 mechanisms.
Ransomed
Malware Analysis
hardReconstruct advanced malware execution by performing dynamic analysis and memory forensics to diagnose process hollowing, dynamic API resolution, and string obfuscation.
Flareon 4
Malware Analysis
hardIntegrate diverse reverse engineering tools and techniques to synthesize solutions for advanced, multi-platform malware analysis challenges.
Phobos
Malware Analysis
insaneAnalyze the Phobos ransomware executable to identify its core behavior, encryption methods, and extract actionable indicators of compromise (IOCs).
UnPackMe
Malware Analysis
insaneAnalyze packed ShadowSteal malware using dynamic and static reverse engineering to extract the RC4 key, mutex, and self-deletion command.
$tealer
Malware Analysis
insaneReverse engineer advanced stealer malware, identifying PE structure, dynamic API resolution, anti-analysis techniques, and RC4 string decryption to extract C2 IOCs using IDA Pro and CAPA.
Flareon 3
Malware Analysis
insaneAnalyze and reverse engineer complex malicious challenges using static and dynamic analysis tools to uncover hidden functionality and extract IOCs.
Flareon 5
Malware Analysis
insaneSynthesize advanced reverse engineering techniques to analyze complex malicious binaries and extract hidden flags using IDA Pro, debuggers, and specialized tools.
Flareon 6
Malware Analysis
insaneReverse engineer diverse, obfuscated malware samples using static and dynamic analysis tools to identify functionality and extract embedded artifacts.
Flareon 7
Malware Analysis
insaneSynthesize advanced static and dynamic analysis techniques using IDA Pro and debuggers to solve complex reverse engineering challenges.
Flareon 1
Malware Analysis
insaneDetermine hidden flags and program logic by reverse engineering unknown binaries using static and dynamic analysis tools.
Flareon 2
Malware Analysis
insaneReverse engineer multi-stage malicious binaries using IDA Pro and debuggers to uncover hidden functionality and extract embedded flags.



















