| Date | User | Challenge | Score |
| Aryaethn | Megalomaniac 2 | 120 | |
| greg81 | Bringing It All Together | 50 | |
| joy40 | Bringing It All Together | 50 | |
| joeydumont | Legendre Symbol | 35 | |
| darshna | The Good, The Pad, The Ugly | 100 | |
| ecclock | Elliptic Nodes | 150 | |
| caleb_wendi | Base64 | 10 | |
| mauve | ASCII | 5 | |
| mauve | Great Snakes | 3 | |
| j_m | XOR Starter | 10 | |
| P23011 | Background Reading | 5 | |
| P23011 | Network Attacks | 5 | |
| P23011 | Lemur XOR | 40 | |
| namdang | Bespoke Padding | 100 | |
| P23011 | Deriving Symmetric Keys | 40 | |
| ali_hamas | Jack's Birthday Confusion | 30 | |
| eoin | Gaussian Reduction | 50 | |
| mauve | Finding Flags | 2 | |
| ali_hamas | Jack's Birthday Hash | 20 | |
| aleena_meraj | PriMeD5 | 100 | |
| hedge_hedgehog | Confusion through Substitution | 25 | |
| Aryaethn | Megalomaniac 1 | 100 | |
| SharjeelChandna | PriMeD5 | 100 | |
| caleb_wendi | Hex | 5 | |
| eoin | What's a Lattice? | 40 | |
| socram0x | CERTainly not | 30 | |
| greg81 | Diffusion through Permutation | 30 | |
| socram0x | Transparency | 50 | |
| darshna | Collider | 50 | |
| socram0x | SSH Keys | 35 | |
| P23011 | Successive Powers | 60 | |
| eoin | Gram Schmidt | 30 | |
| FranciscoCiego | XOR Properties | 15 | |
| caleb_wendi | ASCII | 5 | |
| P23011 | JSON in JSON | 40 | |
| P23011 | JWT Secrets | 25 | |
| P23011 | No Way JOSE | 20 | |
| IHateFrogs | Parameter Injection | 60 | |
| greg81 | Confusion through Substitution | 25 | |
| P23011 | JWT Sessions | 10 | |
| P23011 | Token Appreciation | 5 | |
| eoin | Vectors | 10 | |
| P23011 | Confusion through Substitution | 25 | |
| j_m | Encoding Challenge | 40 | |
| nadavk100 | Modular Square Root | 35 | |
| P23011 | Round Keys | 20 | |
| P23011 | Structure of AES | 15 | |
| Aryaethn | RSA or HMAC? Part 2 | 100 | |
| P23011 | Resisting Bruteforce | 10 | |
| Wbzzz | Modular Binomials | 80 |
You are now level Current level