Now in Early Access

Learn to reverse engineer software.

Master the skills that security researchers, malware analysts, and game hackers use every day. Interactive lessons run entirely in your browser - no VMs, no setup, no friction.

challenge.asm
; Find the correct input to unlock
main:
push rbp
mov rbp, rsp
sub rsp, 0x20
lea rcx, [prompt]
call printf
lea rcx, [rbp-0x10]
call gets
xor eax, eax
cmp byte [rbp-0x10], 0x42
jne .fail

Learn by doing

Every concept is immediately followed by hands-on practice in an interactive environment.

Step 1

Read the concept

Short, focused explanations break down one idea at a time. No hour-long videos - just what you need to solve the next challenge.

Foundations / The Stack

How the stack works

The stack is a region of memory that grows downward. When you push a value, RSP decreases. When you pop, it increases.

Address Value
0x7fff0010 0x00000000
0x7fff0008 0x41414141 RSP
0x7fff0000 0x00000000
Step 2

Watch it execute

Step through real assembly instruction by instruction. See registers change, watch the stack grow, understand exactly what each line does.

0x401000 push rbp
0x401001 mov rbp, rsp
0x401004 sub rsp, 0x20
0x401008 mov eax, 1
RAX0x0000000000000000
RBP0x00007fffffffe480
RSP0x00007fffffffe480
RIP0x0000000000401001
Step 3

Solve the challenge

Apply what you learned to figure out the correct input, patch the binary, or find the hidden flag. Instant feedback tells you if you got it right.

Challenge: Crack the Serial Easy
This program checks a serial number. Find the correct input.
You found it! The serial validation XORs each character with 0x42.

Everything runs in your browser

Real CPU emulation via WebAssembly. No VMs to download, no environment to configure.

Memory View 0x00401000
00401000 55 48 89 E5 48 83 EC 20 UH..H...
00401008 B8 01 00 00 00 89 45 FC ......E.
00401010 8B 45 FC 83 C0 05 89 45 .E.....E
00401018 F8 8B 45 F8 48 83 C4 20 ..E.H...

Instant execution

Code runs immediately - no compilation wait, no server round-trips.

Full memory inspection

Hex dumps, stack views, and register panels update live as you step.

Set breakpoints

Click any line to pause execution. Inspect state at any point.

Safe sandboxing

Everything runs isolated in your browser. Nothing touches your system.

The Curriculum

Start with fundamentals, progress to real challenges. Everything runs in your browser.

01
Available

Foundations

Understand how computers execute code at the lowest level.

  • x86/x64 architecture basics
  • Registers, flags, and the stack
  • Calling conventions
  • Memory layout and addressing
  • Arithmetic and bitwise operations
12 lessons 8 challenges
02
Available

Analysis

Learn to read and understand compiled code.

  • Reading disassembly
  • Control flow patterns
  • Function identification
  • String and data references
  • Common compiler patterns
10 lessons 12 challenges
03
Available

Cracking

Put your skills to work on real reverse engineering problems.

  • Serial and license checks
  • Binary patching techniques
  • Keygen development
  • Anti-debug basics
  • Simple obfuscation
14 lessons 18 challenges
04
Coming Soon

Tooling

Take your skills beyond the browser with professional tools.

  • IDA Pro and Ghidra
  • x64dbg and GDB
  • Scripting and automation
  • Real binary analysis
  • Downloadable VMs
Coming 2025

Simple pricing

Start free. Upgrade when you're ready for advanced content.

Free

$0

Learn the fundamentals at your own pace.

  • Full Foundations phase (12 lessons)
  • 8 interactive challenges
  • Browser-based code execution
  • Progress tracking
  • Community forum access

Course Bundles

$99-299

Deep dives into specialized topics.

  • Game Hacking Fundamentals
  • Windows Kernel Reversing
  • Malware Analysis Masterclass
  • ARM Reverse Engineering
  • Lifetime access to purchased courses

Start learning reverse engineering today.

Join the waitlist for early access to new courses and features. No spam - just occasional updates on what we're building.

Free tier available now. Pro launches Q1 2025.