| Date | User | Challenge | Score |
| Duvim | Finding Flags | 2 | |
| administrator___ | Modular Arithmetic 2 | 20 | |
| iniM0n | Flipping Cookie | 60 | |
| iniM0n | ECB CBC WTF | 55 | |
| fri3m4 | Public Keys | 15 | |
| iniM0n | ECB Oracle | 60 | |
| svt | ASCII | 5 | |
| Mohammad28 | Base64 | 10 | |
| rubber_duck | XOR Starter | 10 | |
| fri3m4 | Modular Exponentiation | 10 | |
| phat1911 | Greatest Common Divisor | 15 | |
| RAVEN_031 | Everything is Big | 70 | |
| rubber_duck | Bytes and Big Integers | 10 | |
| svt | Great Snakes | 3 | |
| NioZow | MD0 | 80 | |
| svt | Finding Flags | 2 | |
| R00TP1ECE | Finding Flags | 2 | |
| magda_almpani | Computing Shared Secrets | 30 | |
| monkeyDluffy | SSH Keys | 35 | |
| prabhat | Base64 | 10 | |
| Sharan07 | Resisting Bruteforce | 10 | |
| aapsemiordoenus | Network Attacks | 5 | |
| prabhat | Hex | 5 | |
| magda_almpani | Computing Public Values | 25 | |
| washer2635 | Jack's Birthday Confusion | 30 | |
| OuahLePleutre | Confusion through Substitution | 25 | |
| Sharan07 | Keyed Permutations | 5 | |
| OuahLePleutre | Round Keys | 20 | |
| Lyca | Generators of Groups | 20 | |
| RezaWijayanti | Flipping Cookie | 60 | |
| RezaWijayanti | ECB CBC WTF | 55 | |
| RezaWijayanti | ECB Oracle | 60 | |
| Lyca | Working with Fields | 10 | |
| OuahLePleutre | Structure of AES | 15 | |
| RAVEN_031 | Moving Problems | 150 | |
| prabhat | ASCII | 5 | |
| prabhat | Great Snakes | 3 | |
| prabhat | Finding Flags | 2 | |
| Nomanur | Token Appreciation | 5 | |
| gsdz | Quadratic Residues | 25 | |
| monkeyDluffy | CERTainly not | 30 | |
| gsdz | Modular Inverting | 25 | |
| gsdz | Modular Arithmetic 2 | 20 | |
| gsdz | Modular Arithmetic 1 | 20 | |
| gsdz | Extended GCD | 20 | |
| gorje | Moving Problems | 150 | |
| gsdz | Greatest Common Divisor | 15 | |
| diffelapi | Computing Shared Secrets | 30 | |
| gsdz | You either know, XOR you don't | 30 | |
| gsdz | Favourite byte | 20 |
You are now level Current level