| Date | User | Challenge | Score |
| Lschchou | Modular Inverting | 25 | |
| Adrean | Base64 | 10 | |
| Adrean | Hex | 5 | |
| Lschchou | Modular Arithmetic 2 | 20 | |
| Adrean | ASCII | 5 | |
| cbr4l0k | Monoprime | 30 | |
| ali_dagistan | Favourite byte | 20 | |
| shachar125 | Modulus Inutilis | 50 | |
| claudevicuna | Gram Schmidt | 30 | |
| andrewk0712 | Factoring | 15 | |
| Lschchou | Modular Arithmetic 1 | 20 | |
| Lschchou | Extended GCD | 20 | |
| cbr4l0k | Factoring | 15 | |
| henzarafaello | Base64 | 10 | |
| Adrean | Great Snakes | 3 | |
| Adrean | Finding Flags | 2 | |
| nous | Authenticator (Firebird Internal CTF) | 0 | |
| Theoo | MD0 | 80 | |
| Alihan | JWT Sessions | 10 | |
| Alihan | Token Appreciation | 5 | |
| Ussser | Chinese Remainder Theorem | 40 | |
| Lschchou | Greatest Common Divisor | 15 | |
| Alihan | Jack's Birthday Confusion | 30 | |
| 4mane | ASCII | 5 | |
| KR4K3NWR3CK3R | Chinese Remainder Theorem | 40 | |
| vlmalo | Bean Counter | 60 | |
| KR4K3NWR3CK3R | Quadratic Residues | 25 | |
| KR4K3NWR3CK3R | You either know, XOR you don't | 30 | |
| KR4K3NWR3CK3R | Favourite byte | 20 | |
| hemra | Diffusion through Permutation | 30 | |
| g0ld3np4r3y | Modulus Inutilis | 50 | |
| 4mane | Great Snakes | 3 | |
| claudevicuna | Size and Basis | 15 | |
| hemra | Confusion through Substitution | 25 | |
| MuhammadTIB | Base64 | 10 | |
| Benvictor | Adrien's Signs | 80 | |
| hemra | Round Keys | 20 | |
| Lschchou | Favourite byte | 20 | |
| hemra | Structure of AES | 15 | |
| shachar125 | Salty | 20 | |
| mohigul | Finding Flags | 2 | |
| Alihan | Deriving Symmetric Keys | 40 | |
| 4mane | Finding Flags | 2 | |
| Laith3 | Favourite byte | 20 | |
| Benvictor | Chinese Remainder Theorem | 40 | |
| claudevicuna | Vectors | 10 | |
| hemra | Resisting Bruteforce | 10 | |
| Benvictor | Modular Square Root | 35 | |
| KR4K3NWR3CK3R | Manyprime | 40 | |
| Alihan | Computing Shared Secrets | 30 |
You are now level Current level