| Date | User | Challenge | Score |
| 0xJ3ran | JWT Sessions | 10 | |
| brayton_lee | Modular Inverting | 25 | |
| Quine | Generators of Groups | 20 | |
| CarloTran | Hex | 5 | |
| 0xJ3ran | Token Appreciation | 5 | |
| CarloTran | ASCII | 5 | |
| Satya_Yadav10 | ASCII | 5 | |
| brayton_lee | Modular Arithmetic 2 | 20 | |
| mahu | Structure of AES | 15 | |
| plushie | Extended GCD | 20 | |
| CarloTran | Great Snakes | 3 | |
| mental_librarian | Base64 | 10 | |
| tmslaurent | XOR Properties | 15 | |
| mental_librarian | Hex | 5 | |
| halliana | Factoring | 15 | |
| mental_librarian | ASCII | 5 | |
| mental_librarian | Great Snakes | 3 | |
| mental_librarian | Finding Flags | 2 | |
| skiller3478 | Static Client 2 | 120 | |
| betray | Round Keys | 20 | |
| betray | Structure of AES | 15 | |
| plushie | Greatest Common Divisor | 15 | |
| dioguebas | Favourite byte | 20 | |
| plushie | You either know, XOR you don't | 30 | |
| skiller3478 | Export-grade | 100 | |
| betray | Resisting Bruteforce | 10 | |
| tera | Armory | 100 | |
| betray | Keyed Permutations | 5 | |
| plushie | Favourite byte | 20 | |
| mahu | Resisting Bruteforce | 10 | |
| amr_hassan | Inferius Prime | 30 | |
| Akylbek | ECB Oracle | 60 | |
| tmslaurent | XOR Starter | 10 | |
| plushie | XOR Properties | 15 | |
| eubdq | Bytes and Big Integers | 10 | |
| Akylbek | ECB CBC WTF | 55 | |
| Akylbek | Passwords as Keys | 50 | |
| tmslaurent | Bytes and Big Integers | 10 | |
| eubdq | Base64 | 10 | |
| Akylbek | Modes of Operation Starter | 15 | |
| dioguebas | XOR Properties | 15 | |
| mahu | Keyed Permutations | 5 | |
| plushie | XOR Starter | 10 | |
| eubdq | Hex | 5 | |
| volkandr | Finding Flags | 2 | |
| eubdq | ASCII | 5 | |
| giovaniseb | Jack's Birthday Confusion | 30 | |
| giovaniseb | Jack's Birthday Hash | 20 | |
| Amat2s | Hex | 5 | |
| tmslaurent | Base64 | 10 |
You are now level Current level