| Date | User | Challenge | Score |
| lazy_user_651805 | Hex | 5 | |
| lazy_user_651805 | ASCII | 5 | |
| huli07 | Base64 | 10 | |
| Fox2872 | Lemur XOR | 40 | |
| yairRubin4 | Inferius Prime | 30 | |
| EvelynV | SSH Keys | 35 | |
| lazy_user_651805 | Great Snakes | 3 | |
| TinyLean | Successive Powers | 60 | |
| huli07 | Hex | 5 | |
| lazy_user_651805 | Finding Flags | 2 | |
| TinyLean | Adrien's Signs | 80 | |
| TinyLean | Modular Binomials | 80 | |
| TinyLean | Broken RSA | 100 | |
| TinyLean | No Way Back Home | 100 | |
| TinyLean | Legendre Symbol | 35 | |
| Malka | You either know, XOR you don't | 30 | |
| TinyLean | Chinese Remainder Theorem | 40 | |
| huli07 | ASCII | 5 | |
| sheina906 | Static Client | 100 | |
| danielmagram | Modular Arithmetic 1 | 20 | |
| glitchcat | Network Attacks | 5 | |
| yairRubin4 | Factoring | 15 | |
| ymoe3 | Encoding Challenge | 40 | |
| NadavIsraeli | Extended GCD | 20 | |
| SmolYulia | Jack's Birthday Confusion | 30 | |
| EvelynV | CERTainly not | 30 | |
| danieldanielovic | Base64 | 10 | |
| Malka | Favourite byte | 20 | |
| TasosB | Greatest Common Divisor | 15 | |
| paulti | ECB CBC WTF | 55 | |
| marvas | Structure of AES | 15 | |
| Mejkl | ZKP Introduction | 5 | |
| gruthcypher | Bytes and Big Integers | 10 | |
| TasosB | Lemur XOR | 40 | |
| liya | XOR Starter | 10 | |
| eljefe | Extended GCD | 20 | |
| NadavIsraeli | Greatest Common Divisor | 15 | |
| EvelynV | Privacy-Enhanced Mail? | 25 | |
| NadavIsraeli | Lemur XOR | 40 | |
| gruthcypher | Base64 | 10 | |
| SmolYulia | Jack's Birthday Hash | 20 | |
| Z5 | Modes of Operation Starter | 15 | |
| Mitre | XOR Properties | 15 | |
| eytangut | Greatest Common Divisor | 15 | |
| gruthcypher | Hex | 5 | |
| Jigenz | Bruce Schneier's Password | 100 | |
| Fox2872 | You either know, XOR you don't | 30 | |
| aviviv | Network Attacks | 5 | |
| marvas | Resisting Bruteforce | 10 | |
| yairRubin4 | RSA Signatures | 25 |
You are now level Current level