| Date | User | Challenge | Score |
| ngonyo | Finding Flags | 2 | |
| ub_krypto_20 | Structure of AES | 15 | |
| polhan | ASCII | 5 | |
| kara_koulouri | ASCII | 5 | |
| blackout | Private Keys | 20 | |
| blackout | Euler's Totient | 20 | |
| kiraoxy | Hex | 5 | |
| kara_koulouri | Great Snakes | 3 | |
| polhan | Great Snakes | 3 | |
| polhan | Finding Flags | 2 | |
| Amat2s | Efficient Exchange | 50 | |
| ITZ_R4NZ | Base64 | 10 | |
| Dzikra | ASCII | 5 | |
| ub_krypto_20 | Resisting Bruteforce | 10 | |
| ridhorezkyanwar | Base64 | 10 | |
| ub_krypto_20 | Keyed Permutations | 5 | |
| blackout | Public Keys | 15 | |
| smc0478 | Point Negation | 10 | |
| blackout | Modular Exponentiation | 10 | |
| kiraoxy | ASCII | 5 | |
| ub_krypto_20 | Lemur XOR | 40 | |
| ridhorezkyanwar | Hex | 5 | |
| ITZ_R4NZ | Hex | 5 | |
| kiraoxy | Great Snakes | 3 | |
| dkoazwlearning | Micro Transmissions | 120 | |
| ridhorezkyanwar | ASCII | 5 | |
| ITZ_R4NZ | ASCII | 5 | |
| Dzikra | Great Snakes | 3 | |
| ub_krypto_20 | You either know, XOR you don't | 30 | |
| ub_krypto_20 | Favourite byte | 20 | |
| kara_koulouri | Finding Flags | 2 | |
| kiraoxy | Finding Flags | 2 | |
| ub_krypto_20 | XOR Properties | 15 | |
| ITZ_R4NZ | Great Snakes | 3 | |
| ub_krypto_20 | XOR Starter | 10 | |
| Dzikra | Finding Flags | 2 | |
| ridhorezkyanwar | Great Snakes | 3 | |
| ub_krypto_20 | Modular Inverting | 25 | |
| ub_krypto_20 | Modular Arithmetic 2 | 20 | |
| ub_krypto_20 | Modular Arithmetic 1 | 20 | |
| ub_krypto_20 | Extended GCD | 20 | |
| ridhorezkyanwar | Finding Flags | 2 | |
| ITZ_R4NZ | Finding Flags | 2 | |
| ub_krypto_20 | Greatest Common Divisor | 15 | |
| Fatekeeper | ECB Oracle | 60 | |
| Kanad3 | Everything is Still Big | 100 | |
| francesco12311 | Bytes and Big Integers | 10 | |
| Vanish | Meet me in the Claw | 120 | |
| kokolud | Modular Arithmetic 1 | 20 | |
| shhack96 | Working with Fields | 10 |
You are now level Current level