| Challenge | Category | Difficulty | Score | State | Penalty | Date Submitted |
|---|---|---|---|---|---|---|
| Corrupted File | Digital Forensics | Medium | 300 | Accepted | - 3 | January 6, 2026, 23:57 |
| Follow Stream | Digital Forensics | Medium | 300 | Accepted | - 4 | January 6, 2026, 23:43 |
| Seed | Miscellaneous | Easy | 200 | Accepted | - 3 | January 6, 2026, 23:36 |
| Affine Cipher | Cryptography | Easy | 200 | Accepted | - 4 | January 6, 2026, 23:27 |
| Wireshark | Digital Forensics | Easy | 200 | Accepted | - 6 | January 6, 2026, 23:26 |
| Binwalk | Digital Forensics | Easy | 200 | Accepted | - 4 | January 6, 2026, 23:19 |
| PyDis | Reverse Engineering | Easy | 200 | Accepted | - 3 | January 6, 2026, 23:15 |
| Nested For Loops | Programming | Easy | 200 | Accepted | - 1 | January 6, 2026, 23:14 |
| Miscellaneous | Easy | 200 | Accepted | - 5 | January 6, 2026, 23:13 | |
| SQL Injection | Web Exploitation | Easy | 200 | Accepted | - 4 | January 6, 2026, 23:07 |
| POST | Web Exploitation | Basic | 100 | Accepted | - 3 | January 6, 2026, 22:47 |
| File | Digital Forensics | Basic | 100 | Accepted | - 1 | January 6, 2026, 22:42 |