| Date | User | Challenge | Score |
| FeduuML | Transparency | 50 | |
| Adriantec | XOR Properties | 15 | |
| JoseAEspinoza | Great Snakes | 3 | |
| reny | Static Client | 100 | |
| JoseAEspinoza | Network Attacks | 5 | |
| boudy | XOR Starter | 10 | |
| Apollo13 | Extended GCD | 20 | |
| FeduuML | SSH Keys | 35 | |
| Nunya777 | Bytes and Big Integers | 10 | |
| Apollo13 | Greatest Common Divisor | 15 | |
| Vr360_ | Finding Flags | 2 | |
| boudy | Bytes and Big Integers | 10 | |
| Snnyan | Bytes and Big Integers | 10 | |
| akkurl | Passwords as Keys | 50 | |
| littleseal26 | Passwords as Keys | 50 | |
| akkurl | Modes of Operation Starter | 15 | |
| 0xRaha | XOR Properties | 15 | |
| Snacky | Modular Binomials | 80 | |
| boudy | Base64 | 10 | |
| Anouar404 | Passwords as Keys | 50 | |
| alchemist7 | Manyprime | 40 | |
| FeduuML | CERTainly not | 30 | |
| boudy | Hex | 5 | |
| Darren_Tanui | Modular Binomials | 80 | |
| FeduuML | Privacy-Enhanced Mail? | 25 | |
| akkurl | Bringing It All Together | 50 | |
| akkurl | Diffusion through Permutation | 30 | |
| 0xRaha | XOR Starter | 10 | |
| akkurl | Confusion through Substitution | 25 | |
| akkurl | Round Keys | 20 | |
| akkurl | Structure of AES | 15 | |
| FeduuML | Modular Inverting | 25 | |
| vicci | Chinese Remainder Theorem | 40 | |
| boudy | ASCII | 5 | |
| Darren_Tanui | Adrien's Signs | 80 | |
| vicci | Modular Square Root | 35 | |
| 0xRaha | Bytes and Big Integers | 10 | |
| akkurl | Resisting Bruteforce | 10 | |
| FeduuML | Modular Arithmetic 2 | 20 | |
| boudy | Great Snakes | 3 | |
| vicci | Legendre Symbol | 35 | |
| akkurl | Keyed Permutations | 5 | |
| JoseAEspinoza | Finding Flags | 2 | |
| FeduuML | Modular Arithmetic 1 | 20 | |
| Darren_Tanui | Chinese Remainder Theorem | 40 | |
| vicci | Quadratic Residues | 25 | |
| boudy | Finding Flags | 2 | |
| HalimaDT | Finding Flags | 2 | |
| Darren_Tanui | Modular Square Root | 35 | |
| vicci | Modular Inverting | 25 |
You are now level Current level