| Date | User | Challenge | Score |
| 0xhikal | Favourite byte | 20 | |
| zerodaygym | XOR Properties | 15 | |
| J3sus_Chris | Modes of Operation Starter | 15 | |
| ArdorBlossom | Public Keys | 15 | |
| pinkballoons | Jack's Birthday Confusion | 30 | |
| zerodaygym | XOR Starter | 10 | |
| Crayon | You either know, XOR you don't | 30 | |
| ArdorBlossom | Modular Exponentiation | 10 | |
| julesfress | Great Snakes | 3 | |
| julesfress | Finding Flags | 2 | |
| 0xhikal | XOR Properties | 15 | |
| J3sus_Chris | ECB Oracle | 60 | |
| zerodaygym | Bytes and Big Integers | 10 | |
| ezionoir | Confusion through Substitution | 25 | |
| zerodaygym | Base64 | 10 | |
| Crayon | Favourite byte | 20 | |
| dXNlcm5hbWU_ | Inferius Prime | 30 | |
| ezionoir | Round Keys | 20 | |
| zerodaygym | Hex | 5 | |
| zerodaygym | ASCII | 5 | |
| yrighting | Bytes and Big Integers | 10 | |
| zerodaygym | Great Snakes | 3 | |
| zerodaygym | Finding Flags | 2 | |
| Ahmed_Hamdy | Base64 | 10 | |
| Ahmed_Hamdy | Hex | 5 | |
| ezionoir | Structure of AES | 15 | |
| 0xhikal | XOR Starter | 10 | |
| Ahmed_Hamdy | ASCII | 5 | |
| minsoo | Modular Inverting | 25 | |
| cat1cat2cat | ASCII | 5 | |
| ipe22 | Keyed Permutations | 5 | |
| nk0 | Curveball | 100 | |
| ayanatbb | Passwords as Keys | 50 | |
| The_cocogun | Modular Exponentiation | 10 | |
| cat1cat2cat | Great Snakes | 3 | |
| 0xhikal | Bytes and Big Integers | 10 | |
| ayanatbb | Bringing It All Together | 50 | |
| ayanatbb | Diffusion through Permutation | 30 | |
| y0dam4n | Ron was Wrong, Whit is Right | 90 | |
| Crayon | XOR Properties | 15 | |
| J3sus_Chris | ECB CBC WTF | 55 | |
| ayanatbb | Confusion through Substitution | 25 | |
| ezionoir | Resisting Bruteforce | 10 | |
| ayanatbb | Round Keys | 20 | |
| ezionoir | Keyed Permutations | 5 | |
| 0xhikal | Base64 | 10 | |
| yrighting | Base64 | 10 | |
| ezionoir | Network Attacks | 5 | |
| minsoo | Modular Arithmetic 2 | 20 | |
| sma11pi9 | Hash Stuffing | 50 |
You are now level Current level