| Date | User | Challenge | Score |
| immsoleym | Salty | 20 | |
| immsoleym | Factoring | 15 | |
| Darks | Network Attacks | 5 | |
| return42 | Export-grade | 100 | |
| MoosaOrigano | Base64 | 10 | |
| nous | What's My Kernel | 70 | |
| Padillaedwin | Adrien's Signs | 80 | |
| minshay | Hex | 5 | |
| sadiksha33 | Finding Flags | 2 | |
| daeman | Bytes and Big Integers | 10 | |
| return42 | Parameter Injection | 60 | |
| Padillaedwin | Chinese Remainder Theorem | 40 | |
| nous | Dancing Queen | 120 | |
| Crisxian | Diffusion through Permutation | 30 | |
| Crisxian | Confusion through Substitution | 25 | |
| nous | Prime Power Isogenies | 50 | |
| Meen4 | Elliptic Nodes | 150 | |
| TechnoVolt | Modular Inverting | 25 | |
| nous | Blinding Light | 120 | |
| return42 | Deriving Symmetric Keys | 40 | |
| morin79 | Base64 | 10 | |
| return42 | Computing Shared Secrets | 30 | |
| return42 | Computing Public Values | 25 | |
| minshay | ASCII | 5 | |
| minshay | Great Snakes | 3 | |
| Smuggler | Passwords as Keys | 50 | |
| return42 | Generators of Groups | 20 | |
| VuiVe | No Difference | 175 | |
| return42 | Working with Fields | 10 | |
| Jonirene | Diffusion through Permutation | 30 | |
| Jonirene | Confusion through Substitution | 25 | |
| Jonirene | Round Keys | 20 | |
| Jonirene | Resisting Bruteforce | 10 | |
| TechnoVolt | Modular Arithmetic 2 | 20 | |
| TechnoVolt | Modular Arithmetic 1 | 20 | |
| Crisxian | Round Keys | 20 | |
| Jonirene | Structure of AES | 15 | |
| Crisxian | Structure of AES | 15 | |
| Crisxian | Resisting Bruteforce | 10 | |
| Namunamu | Lazy CBC | 60 | |
| Crisxian | Keyed Permutations | 5 | |
| Smuggler | Modes of Operation Starter | 15 | |
| Eljoy | Resisting Bruteforce | 10 | |
| Eljoy | Keyed Permutations | 5 | |
| zeroday651 | Export-grade | 100 | |
| PatrickL_SC | Signing Server | 60 | |
| Namunamu | Flipping Cookie | 60 | |
| nhule0235 | Modular Inverting | 25 | |
| jackoha | Trust Games | 150 | |
| Novy | Confusion through Substitution | 25 |
You are now level Current level