| Date | User | Challenge | Score |
| membeer | XOR Starter | 10 | |
| Sh3lly | Modular Inverting | 25 | |
| Base64 | XOR Properties | 15 | |
| membeer | Bytes and Big Integers | 10 | |
| ghx312 | Moving Problems | 150 | |
| maxwang | Hex | 5 | |
| maxwang | ASCII | 5 | |
| maxwang | Great Snakes | 3 | |
| kcaramancion | Finding Flags | 2 | |
| LeeDuck | Finding Flags | 2 | |
| DuanYeong | ASCII | 5 | |
| Muhtar | Bringing It All Together | 50 | |
| maxwang | Finding Flags | 2 | |
| Muhtar | Diffusion through Permutation | 30 | |
| Sh3lly | Modular Arithmetic 2 | 20 | |
| DuanYeong | Great Snakes | 3 | |
| Base64 | XOR Starter | 10 | |
| snowball2 | ASCII | 5 | |
| DuanYeong | Finding Flags | 2 | |
| jinkun | ASCII | 5 | |
| Lienep | Decrypting TLS 1.3 | 35 | |
| Plig | Finding Flags | 2 | |
| namdang | Parameter Injection | 60 | |
| jinkun | Great Snakes | 3 | |
| yangjk | Great Snakes | 3 | |
| snowball2 | Great Snakes | 3 | |
| midfirewear | Roll your Own | 125 | |
| maxwang | Structure of AES | 15 | |
| ELIEL_MATH | Great Snakes | 3 | |
| KOREA | Efficient Exchange | 50 | |
| KOREA | Curves and Logs | 40 | |
| ShaZ | You either know, XOR you don't | 30 | |
| snowball2 | Finding Flags | 2 | |
| ShaZ | Favourite byte | 20 | |
| rachellthedinh | Modular Arithmetic 1 | 20 | |
| yangjk | Finding Flags | 2 | |
| KOREA | Scalar Multiplication | 35 | |
| maxwang | Resisting Bruteforce | 10 | |
| KOREA | Point Addition | 30 | |
| maxwang | Keyed Permutations | 5 | |
| KOREA | Point Negation | 10 | |
| KOREA | Background Reading | 5 | |
| rachellthedinh | Extended GCD | 20 | |
| kinoshita | Base64 | 10 | |
| __chinmayee__ | Resisting Bruteforce | 10 | |
| Bonolori404 | ASCII | 5 | |
| __chinmayee__ | Keyed Permutations | 5 | |
| Base64 | Bytes and Big Integers | 10 | |
| Base64 | Base64 | 10 | |
| Base64 | Hex | 5 |
You are now level Current level