| Date | User | Challenge | Score |
| BillerKean | XOR Properties | 15 | |
| hedge_hedgehog | Passwords as Keys | 50 | |
| jotaghz | Let's Prove It Again | 175 | |
| MaxK | Modular Arithmetic 1 | 20 | |
| WQuench | XOR Starter | 10 | |
| Kinokoda | Adrien's Signs | 80 | |
| BillerKean | XOR Starter | 10 | |
| Mejkl | Endless Emails | 150 | |
| BillerKean | Bytes and Big Integers | 10 | |
| NoamN | Privacy-Enhanced Mail? | 25 | |
| patryk | JSON in JSON | 40 | |
| ASN_123 | Greatest Common Divisor | 15 | |
| semisweetdude | Greatest Common Divisor | 15 | |
| BillerKean | Base64 | 10 | |
| patryk | RSA or HMAC? | 35 | |
| BillerKean | Hex | 5 | |
| BillerKean | ASCII | 5 | |
| BillerKean | Great Snakes | 3 | |
| 0xdaemon | Crossed Wires | 100 | |
| BillerKean | Finding Flags | 2 | |
| glitchcat | XOR Starter | 10 | |
| juxf0rfun | You either know, XOR you don't | 30 | |
| patryk | JWT Secrets | 25 | |
| mary12555488 | Monoprime | 30 | |
| _Zer0__ | Hex | 5 | |
| patryk | No Way JOSE | 20 | |
| mary12555488 | Factoring | 15 | |
| _Zer0__ | ASCII | 5 | |
| eirene | Greatest Common Divisor | 15 | |
| 2uerti | Modular Inverting | 25 | |
| bill_crypt | Salty | 20 | |
| 2uerti | Modular Arithmetic 2 | 20 | |
| eciid | Favourite byte | 20 | |
| patryk | JWT Sessions | 10 | |
| 2uerti | Modular Arithmetic 1 | 20 | |
| 2uerti | Extended GCD | 20 | |
| patryk | Token Appreciation | 5 | |
| MaxK | Extended GCD | 20 | |
| mary12555488 | Encoding Challenge | 40 | |
| 0xdaemon | Everything is Big | 70 | |
| ASN_123 | You either know, XOR you don't | 30 | |
| eciid | XOR Properties | 15 | |
| Kinokoda | Chinese Remainder Theorem | 40 | |
| mary12555488 | Structure of AES | 15 | |
| juxf0rfun | Favourite byte | 20 | |
| NoamN | Extended GCD | 20 | |
| mary12555488 | Round Keys | 20 | |
| mary12555488 | Modular Square Root | 35 | |
| wcantrell08 | Armory | 100 | |
| dkoazwlearning | Computing Public Values | 25 |
You are now level Current level