(Valid until December 1st, 23:30 CET)

🎉 Black Friday/Cyber Monday Sale 🎉

Grab 25% off with code BLACKFRIDAY25 at checkout

Our Trainings

  • £149.99 or 3 monthly payments of £55

Zero 2 Automated

  • 97 Lessons
  • Discord access

Developed for those looking to further enhance their skills in the Malware Analysis/Reverse Engineering field.

Please Note: While the original Beginner Malware Analysis Course is being remastered, we have temporarily discontinued new purchases of the Ultimate Malware Reverse Engineering Bundle.

*Sandbox & MISP Bundle is currently unavailable

Gifting Options

Hoping to gift the course to an aspiring or experienced reverse engineer? Look no further!

  • £149.99

Gift Certificate: Zero2Automated

A gift certificate which allows the recipient of your choice to gain access to the Zero2Automated course, free of charge.

Remembering Vitali Kremez

Hex-Rays Discount

We have also partnered with a company you may be familiar with... Hex-Rays!
Upon purchasing the course*, you will be able to grab a 10% discount on an IDA Pro Named License or an IDA Home License, with the discount remaining valid for one year from your course purchase date! In order to activate the discount, it's as simple as adding the license to your cart and then entering your course email address in the "end user email" box, before clicking "update"!

Plus, get 15% off all online Hex-Rays trainings!

*(All existing students will be able to take advantage of this discount for 1 year starting 29/09/2021)

Who Are We?

Vitali Kremez (@VK_Intel)

Vitali Kremez is a well-known ethical hacker. His cybercrime and nation-state research and discoveries led to his direct name appearing in the malware linked to the Russian nation-state group known as "APT28," which is believed to be the military operation led by the Russian GRU.
He is a former US cybercrime government analyst responsible for tracking and hunting a number of the Eastern European cyber criminals arrested abroad with his notable public case related to the StubHub intrusion. 

Daniel Bunce (@0verfl0w_)

Daniel Bunce is a Security Researcher who specializes in Malware Reverse-Engineering. Initially starting off in the field interested in Offensive Security tactics, he used that knowledge to transition over to Reverse Engineering and Malware Analysis, where he now spends most of his time looking at Windows based E-Crime malware and working on tools for gathering further intelligence, such as developing automated unpackers, configuration extractors, and botnet communication emulators.

Jason Reaves (@sysopfb)

Jason Reaves is a Threat Researcher who specializes in malware reverse-engineering within the Crimeware space. He has spent the majority of his career tracking threats in the Crimeware space, including reverse-engineering data structures found in malware in order to create automated frameworks for harvesting botnet data. Jason holds multiple certifications related to reverse-engineering, application exploitation and has published numerous papers on topics surrounding malware reverse engineering.