| Date | User | Challenge | Score |
| iceo96 | Favourite byte | 20 | |
| mishustick | ASCII | 5 | |
| SeifAhmed | Structure of AES | 15 | |
| val_airinei | Euler's Totient | 20 | |
| super445 | ASCII | 5 | |
| SeifAhmed | Resisting Bruteforce | 10 | |
| mishustick | Great Snakes | 3 | |
| SeifAhmed | Keyed Permutations | 5 | |
| mishustick | Finding Flags | 2 | |
| Liam7_7 | Finding Flags | 2 | |
| yousef_farag | Network Attacks | 5 | |
| brg | Hex | 5 | |
| val_airinei | Public Keys | 15 | |
| 25520221 | Pad Thai | 80 | |
| mihaiDraghici | Monoprime | 30 | |
| val_airinei | Modular Exponentiation | 10 | |
| mugiwara44 | Base64 | 10 | |
| crystaljade | Resisting Bruteforce | 10 | |
| bobsyouruncle132 | ZKP Introduction | 5 | |
| val_airinei | Bean Counter | 60 | |
| nmhuei | Deriving Symmetric Keys | 40 | |
| iceo96 | XOR Properties | 15 | |
| val_airinei | Symmetry | 50 | |
| b4bbb | Quadratic Residues | 25 | |
| val_airinei | Flipping Cookie | 60 | |
| nmhuei | Computing Shared Secrets | 30 | |
| nmhuei | Computing Public Values | 25 | |
| val_airinei | ECB CBC WTF | 55 | |
| rootPhantom06 | ASCII | 5 | |
| brg | ASCII | 5 | |
| crystaljade | Keyed Permutations | 5 | |
| nmhuei | Generators of Groups | 20 | |
| val_airinei | ECB Oracle | 60 | |
| St4rboy | Greatest Common Divisor | 15 | |
| yousef_farag | You either know, XOR you don't | 30 | |
| josephcmac | Factoring | 15 | |
| PanagiotaTr | Legendre Symbol | 35 | |
| val_airinei | Passwords as Keys | 50 | |
| Priyanshu_42 | ASCII | 5 | |
| rootPhantom06 | Great Snakes | 3 | |
| nmhuei | Working with Fields | 10 | |
| nmhuei | Modulus Inutilis | 50 | |
| Priyanshu_42 | Great Snakes | 3 | |
| mihaiDraghici | Inferius Prime | 30 | |
| brg | Great Snakes | 3 | |
| sigma1 | SSH Keys | 35 | |
| nmhuei | Salty | 20 | |
| rootPhantom06 | Finding Flags | 2 | |
| iceo96 | XOR Starter | 10 | |
| brg | Finding Flags | 2 |
You are now level Current level