| Date | User | Challenge | Score |
| deathknight | PriMeD5 | 100 | |
| deathknight | Megalomaniac 3 | 120 | |
| exoskellyman | Modular Inverting | 25 | |
| hasuke | Quadratic Residues | 25 | |
| muneerahmad | Hex | 5 | |
| muneerahmad | ASCII | 5 | |
| Reariuz | Modular Arithmetic 1 | 20 | |
| rcelada | Hex | 5 | |
| Reariuz | Extended GCD | 20 | |
| salvador | Finding Flags | 2 | |
| m_ee_b | You either know, XOR you don't | 30 | |
| 0xmhmdnsar | RSA Decryption | 20 | |
| m_ee_b | Favourite byte | 20 | |
| m_ee_b | XOR Properties | 15 | |
| Adeka228 | The Matrix | 75 | |
| txd0 | Network Attacks | 5 | |
| m_ee_b | XOR Starter | 10 | |
| m_ee_b | Bytes and Big Integers | 10 | |
| Raha7 | Hex | 5 | |
| m_ee_b | Base64 | 10 | |
| WarSpore | Lazy CBC | 60 | |
| drnikos | Passwords as Keys | 50 | |
| 0xmhmdnsar | Private Keys | 20 | |
| airconditioner4 | Factoring | 15 | |
| Reariuz | Greatest Common Divisor | 15 | |
| 0xmhmdnsar | Euler's Totient | 20 | |
| learnercryptohac | Legendre Symbol | 35 | |
| Raha7 | ASCII | 5 | |
| Raha7 | Great Snakes | 3 | |
| m_ee_b | Hex | 5 | |
| m_ee_b | ASCII | 5 | |
| Raha7 | Finding Flags | 2 | |
| drnikos | Modes of Operation Starter | 15 | |
| WarSpore | The Matrix | 75 | |
| Adeka228 | Script Kiddie | 70 | |
| vzal0308 | Twist and shout (ECSC 2023 (Norway)) | 0 | |
| vzal0308 | Tenet: The Plagarism (HKCERT CTF) | 0 | |
| mpg | Additive | 70 | |
| drnikos | Bringing It All Together | 50 | |
| mgoldie | Finding Flags | 2 | |
| Adeka228 | Static Client 2 | 120 | |
| Adeka228 | Additive | 70 | |
| Adeka228 | Static Client | 100 | |
| Adeka228 | Export-grade | 100 | |
| Aisultan | Blinding Light | 120 | |
| AndyVale | Roll your Own | 125 | |
| Adeka228 | Parameter Injection | 60 | |
| Aisultan | Let's Decrypt Again | 175 | |
| Adeka228 | Deriving Symmetric Keys | 40 | |
| Adeka228 | Computing Shared Secrets | 30 |
You are now level Current level