| Date | User | Challenge | Score |
| lerequin | Resisting Bruteforce | 10 | |
| AndreaMiele | Symmetry | 50 | |
| kat11411486 | Base64 | 10 | |
| kat11411486 | Hex | 5 | |
| AndreaMiele | Flipping Cookie | 60 | |
| Peer | Square Eyes | 35 | |
| 3307 | Bytes and Big Integers | 10 | |
| AndreaMiele | ECB CBC WTF | 55 | |
| lerequin | Keyed Permutations | 5 | |
| 3307 | Base64 | 10 | |
| 3307 | Hex | 5 | |
| 3307 | ASCII | 5 | |
| Peer | You either know, XOR you don't | 30 | |
| AndreaMiele | ECB Oracle | 60 | |
| 3307 | Network Attacks | 5 | |
| 3307 | Great Snakes | 3 | |
| kat11411486 | ASCII | 5 | |
| 3307 | Finding Flags | 2 | |
| Merci_b | Point Negation | 10 | |
| kat11411486 | Great Snakes | 3 | |
| kat11411486 | Finding Flags | 2 | |
| Merci_b | Background Reading | 5 | |
| AndreaMiele | Passwords as Keys | 50 | |
| meyer | Finding Flags | 2 | |
| Dr_dre | Base64 | 10 | |
| AndreaMiele | Modes of Operation Starter | 15 | |
| AndreaMiele | Bringing It All Together | 50 | |
| origabai | Unencryptable | 125 | |
| AndreaMiele | Diffusion through Permutation | 30 | |
| roam | Favourite byte | 20 | |
| abdu04 | ASCII | 5 | |
| tndbang | Cofactor Cofantasy | 150 | |
| Didis2000 | XOR Starter | 10 | |
| mk4akash | Modular Arithmetic 1 | 20 | |
| Ah_Crypto2 | Endless Emails | 150 | |
| AndreaMiele | Confusion through Substitution | 25 | |
| abdu04 | Great Snakes | 3 | |
| Ahmedelbehi | Lazy CBC | 60 | |
| Jerbear3256 | ECB Oracle | 60 | |
| shachar125 | Monoprime | 30 | |
| AndreaMiele | Round Keys | 20 | |
| abdu04 | Finding Flags | 2 | |
| Caju___ | Modular Inverting | 25 | |
| shachar125 | Factoring | 15 | |
| AndreaMiele | Structure of AES | 15 | |
| rarcisse | Computing Public Values | 25 | |
| AndreaMiele | Resisting Bruteforce | 10 | |
| shachar125 | RSA Signatures | 25 | |
| AndreaMiele | Keyed Permutations | 5 | |
| Caju___ | Modular Arithmetic 2 | 20 |
You are now level Current level