| Date | User | Challenge | Score |
| Saulsigma11234 | Finding Flags | 2 | |
| GCHELANGAT | Legendre Symbol | 35 | |
| UIT | Endless Emails | 150 | |
| mochaowo | Lemur XOR | 40 | |
| areyouok | Great Snakes | 3 | |
| GCHELANGAT | Quadratic Residues | 25 | |
| GCHELANGAT | Modular Inverting | 25 | |
| pufik404 | XOR Starter | 10 | |
| D1533 | No Difference | 175 | |
| aaanomy | Bruce Schneier's Password: Part 2 | 250 | |
| mochaowo | Encoding Challenge | 40 | |
| pufik404 | Bytes and Big Integers | 10 | |
| Thaimeo2006 | Mister Saplin's Preview | 80 | |
| cbonilla12858 | Great Snakes | 3 | |
| bro31813 | Encoding Challenge | 40 | |
| Oskar404 | Favourite byte | 20 | |
| cbonilla12858 | Finding Flags | 2 | |
| warsom77 | Encoding Challenge | 40 | |
| Ter3Sni | Working with Fields | 10 | |
| yangjaeseok | Round Keys | 20 | |
| yangjaeseok | Structure of AES | 15 | |
| crypto_saka_hack | Greatest Common Divisor | 15 | |
| timus_999 | Diffusion through Permutation | 30 | |
| Q29tcmFkZV9kZQo | Network Attacks | 5 | |
| minjun | Bean Counter | 60 | |
| mochaowo | Network Attacks | 5 | |
| Ter3Sni | Modulus Inutilis | 50 | |
| pufik404 | Base64 | 10 | |
| teacher1 | Hex | 5 | |
| yangjaeseok | Resisting Bruteforce | 10 | |
| UIT | Everything is Still Big | 100 | |
| TheKY | Monoprime | 30 | |
| yangjaeseok | Keyed Permutations | 5 | |
| pufik404 | Hex | 5 | |
| khyrr | Modular Arithmetic 2 | 20 | |
| khyrr | Modular Arithmetic 1 | 20 | |
| khyrr | Extended GCD | 20 | |
| khyrr | Greatest Common Divisor | 15 | |
| minjun | Symmetry | 50 | |
| aaanomy | Checkpoint | 150 | |
| pufik404 | ASCII | 5 | |
| Ember2819 | You either know, XOR you don't | 30 | |
| cbr4l0k | Moving Problems | 150 | |
| mochaowo | Parameter Injection | 60 | |
| Ember2819 | Favourite byte | 20 | |
| ValT | JWT Sessions | 10 | |
| Ember2819 | XOR Properties | 15 | |
| osihlovec | Three Isogenies | 35 | |
| pufik404 | Great Snakes | 3 | |
| ValT | Token Appreciation | 5 |
You are now level Current level