| Date | User | Challenge | Score |
| joko | Background Reading | 5 | |
| danosito | No Leaks | 100 | |
| 0xGh4zy | RSA or HMAC? | 35 | |
| agentmon | 2020 (TETCTF) | 0 | |
| ho_ongvyy | Factoring | 15 | |
| fabs2 | Monoprime | 30 | |
| danosito | Gotta Go Fast | 40 | |
| fabs2 | Factoring | 15 | |
| A_h_m_3_d | Base64 | 10 | |
| fabs2 | RSA Signatures | 25 | |
| fabs2 | RSA Decryption | 20 | |
| fabs2 | Private Keys | 20 | |
| fabs2 | Euler's Totient | 20 | |
| fabs2 | Public Keys | 15 | |
| fabs2 | Modular Exponentiation | 10 | |
| A_h_m_3_d | Hex | 5 | |
| User0069 | Jack's Birthday Confusion | 30 | |
| User0069 | Jack's Birthday Hash | 20 | |
| agentmon | 1337crypt (DownUnderCTF) | 0 | |
| agentmon | 1337crypt v2 (DownUnderCTF) | 0 | |
| sdigs | CTRIME | 70 | |
| ereiselt | Quadratic Residues | 25 | |
| ho_ongvyy | RSA Decryption | 20 | |
| fabs2 | Passwords as Keys | 50 | |
| mochaowo | PriMeD5 | 100 | |
| phat1911 | Modular Inverting | 25 | |
| ho_ongvyy | Private Keys | 20 | |
| A_h_m_3_d | ASCII | 5 | |
| joko | Deriving Symmetric Keys | 40 | |
| A_h_m_3_d | Great Snakes | 3 | |
| A_h_m_3_d | Finding Flags | 2 | |
| ho_ongvyy | Euler's Totient | 20 | |
| fabs2 | Modes of Operation Starter | 15 | |
| ho_ongvyy | Public Keys | 15 | |
| agentmon | Sign In Please, Again (HKCERT CTF) | 0 | |
| BOTk | Bean Counter | 60 | |
| azhariafitria | Great Snakes | 3 | |
| joko | Computing Shared Secrets | 30 | |
| fabs2 | Bringing It All Together | 50 | |
| fabs2 | Diffusion through Permutation | 30 | |
| fabs2 | Confusion through Substitution | 25 | |
| Snacky | Deriving Symmetric Keys | 40 | |
| ho_ongvyy | Modular Exponentiation | 10 | |
| hailum | Great Snakes | 3 | |
| joko | Computing Public Values | 25 | |
| hailum | Finding Flags | 2 | |
| fabs2 | Round Keys | 20 | |
| fabs2 | Structure of AES | 15 | |
| Snacky | Computing Shared Secrets | 30 | |
| ereiselt | Modular Inverting | 25 |
You are now level Current level