| Date | User | Challenge | Score |
| CallMaNam3_ | Gotta Go Fast | 40 | |
| zerosfajnk | Round Keys | 20 | |
| Mrheisenburgers | Working with Fields | 10 | |
| 0xPh4nt0m | Base64 | 10 | |
| Beci911 | Favourite byte | 20 | |
| marthaha | Extended GCD | 20 | |
| edman | Favourite byte | 20 | |
| Mk01 | You either know, XOR you don't | 30 | |
| Velisar | Quadratic Residues | 25 | |
| edman | XOR Properties | 15 | |
| shawo | Round Keys | 20 | |
| edman | XOR Starter | 10 | |
| Markus | Private Keys | 20 | |
| edman | Bytes and Big Integers | 10 | |
| jianchi998 | Favourite byte | 20 | |
| 25520221 | Logon Zero | 80 | |
| lelemona | Hex | 5 | |
| 0xPh4nt0m | Hex | 5 | |
| cubiepro | Hex | 5 | |
| zJQHAHA1 | Resisting Bruteforce | 10 | |
| NE0x0 | Lemur XOR | 40 | |
| cubiepro | ASCII | 5 | |
| Bobinette | You either know, XOR you don't | 30 | |
| cubiepro | Great Snakes | 3 | |
| zJQHAHA1 | Keyed Permutations | 5 | |
| NE0x0 | Encoding Challenge | 40 | |
| cubiepro | Finding Flags | 2 | |
| 0xPh4nt0m | ASCII | 5 | |
| Markus | Euler's Totient | 20 | |
| vasilik1 | Favourite byte | 20 | |
| edman | Base64 | 10 | |
| Sc4rl3t | Adrien's Signs | 80 | |
| lelemona | ASCII | 5 | |
| Markus | Public Keys | 15 | |
| lxznb | Confusion through Substitution | 25 | |
| Bobinette | Favourite byte | 20 | |
| edman | Hex | 5 | |
| dusiqi2 | Confusion through Substitution | 25 | |
| Velisar | Modular Inverting | 25 | |
| phuctrung | Network Attacks | 5 | |
| TajinOPoulet | Modular Exponentiation | 10 | |
| Mihafil746 | JSON in JSON | 40 | |
| lelemona | Great Snakes | 3 | |
| NitroN | Quadratic Residues | 25 | |
| Mihafil746 | RSA or HMAC? Part 2 | 100 | |
| cbr4l0k | Passwords as Keys | 50 | |
| edman | ASCII | 5 | |
| NE0x0 | Modular Arithmetic 1 | 20 | |
| cahidenes | Nativity | 60 | |
| QRms | Computing Shared Secrets | 30 |
You are now level Current level