A curious escape
|
Cryptography |
Pretty dang easy (3) |
337 |
A different method
|
Cryptography |
Pretty dang easy (3) |
256 |
Accessing routes
|
Cryptography |
Pretty dang easy (3) |
198 |
Acknowledging our forebears
|
Cryptography |
Requires skill (7) |
40 |
Adjoined
|
Programming |
Pretty dang easy (3) |
119 |
Band Practice
|
Steganography |
Moderately difficult (6) |
11 |
Base 8^2
|
Cryptography |
Pretty dang easy (3) |
308 |
Beep Beep
|
Cryptography |
Pretty dang easy (3) |
49 |
Calculate quickly
|
Programming |
Functioning brain required (4) |
127 |
Calculating the Combination
|
Math Puzzles |
Pretty dang easy (3) |
260 |
Cartoon Arithmetic
|
Math Puzzles |
Functioning brain required (4) |
115 |
Classic Cipher Play I
|
Cryptography |
Moderate (5) |
66 |
Classic Cipher Play II
|
Cryptography |
Functioning brain required (4) |
120 |
Classic Cipher Play III
|
Cryptography |
Functioning brain required (4) |
92 |
Computer Talk
|
Cryptography |
Pretty dang easy (3) |
331 |
Crackerjack Encryption
|
Cryptography |
Easy as pie (2) |
180 |
Craptcha I
|
Programming |
Pretty dang easy (3) |
89 |
Craptcha II
|
Programming |
Moderate (5) |
60 |
Craptcha III
|
Programming |
Moderately difficult (6) |
43 |
Craptcha IV
|
Programming |
Not for the faint of heart (8) |
30 |
Craptcha V
|
Programming |
Requires skill (7) |
21 |
Digging Deeper
|
Programming |
Moderate (5) |
71 |
Encoding is not Encryption
|
Cryptography |
Functioning brain required (4) |
85 |
Hams do it with more frequency
|
Cryptography |
Moderately difficult (6) |
18 |
Hashed
|
Cryptography |
Pretty dang easy (3) |
207 |
Hashed II
|
Cryptography |
Moderate (5) |
22 |
Homebrewed
|
Cryptography |
Requires skill (7) |
39 |
Hop Skip and Jump
|
Cryptography |
Pretty dang easy (3) |
98 |
I came, I saw, I encrypted
|
Cryptography |
Easy as pie (2) |
297 |
Inserted
|
Programming |
Functioning brain required (4) |
117 |
Javascript Entertainment
|
Enumeration |
Pretty dang easy (3) |
253 |
JSON and the Argonauts I
|
Programming |
Moderate (5) |
32 |
JSON and the Argonauts II
|
Programming |
Requires skill (7) |
24 |
JSON and the Argonauts III
|
Programming |
Moderately difficult (6) |
22 |
Julius's Key
|
Cryptography |
Pretty dang easy (3) |
156 |
K3
|
Cryptography |
Moderately difficult (6) |
36 |
Logic Cubed
|
Math Puzzles |
Pretty dang easy (3) |
183 |
Logjam Disarray
|
Enumeration |
Moderately difficult (6) |
44 |
Making words out of numbers
|
Programming |
Moderate (5) |
89 |
Malformed
|
Enumeration |
Pretty dang easy (3) |
78 |
Malformed II
|
Enumeration |
Moderately difficult (6) |
17 |
Message for you sir!
|
Cryptography |
Functioning brain required (4) |
102 |
Mixing up the classics
|
Cryptography |
Functioning brain required (4) |
121 |
More classical review
|
Cryptography |
Pretty dang easy (3) |
101 |
New wave gibberish
|
Cryptography |
Easy as pie (2) |
227 |
Oink Oink
|
Cryptography |
Pretty dang easy (3) |
161 |
On the fence
|
Cryptography |
Pretty dang easy (3) |
134 |
Parse it fast
|
Programming |
Moderate (5) |
82 |
Pass, Fail or Skipped?
|
Programming |
Moderately difficult (6) |
48 |
Pin-up Steganography
|
Steganography |
Moderate (5) |
121 |
Pin-up Steganography II
|
Steganography |
Moderately difficult (6) |
121 |
Pin-up Steganography III
|
Steganography |
Requires skill (7) |
16 |
Play Fair!
|
Cryptography |
Pretty dang easy (3) |
155 |
Poking Around I
|
Enumeration |
Easy as pie (2) |
179 |
Poking Around II
|
Enumeration |
Easy as pie (2) |
206 |
Poking Around III
|
Enumeration |
Functioning brain required (4) |
75 |
Poking Around IV
|
Enumeration |
Pretty dang easy (3) |
161 |
Poking Around V
|
Enumeration |
Pretty dang easy (3) |
102 |
Poking Around VI
|
Enumeration |
Pretty dang easy (3) |
120 |
Profiling Pieces
|
Forensics |
Functioning brain required (4) |
81 |
Real Men of Genius I
|
Steganography |
Pretty dang easy (3) |
115 |
Real Men of Genius II
|
Steganography |
Functioning brain required (4) |
95 |
Repetitive math
|
Programming |
Pretty dang easy (3) |
133 |
Resource Management
|
Forensics |
Functioning brain required (4) |
31 |
Return to sender
|
Cryptography |
Easy as pie (2) |
181 |
Reversing the application I
|
Programming |
Moderate (5) |
77 |
Reversing the application II
|
Programming |
Moderate (5) |
26 |
Reversing the application III
|
Programming |
Moderate (5) |
65 |
Rumplestiltskin
|
Enumeration |
Functioning brain required (4) |
17 |
Searching for clues
|
Forensics |
Functioning brain required (4) |
53 |
Selecting the right OS
|
Programming |
Pretty dang easy (3) |
234 |
Shifted
|
Cryptography |
Functioning brain required (4) |
55 |
Speak up
|
Programming |
Functioning brain required (4) |
53 |
Stego-what?
|
Steganography |
Functioning brain required (4) |
52 |
Templar Decoder Ring
|
Cryptography |
Pretty dang easy (3) |
141 |
Terminal Hacking
|
Enumeration |
Moderately difficult (6) |
77 |
The tools are out there
|
Cryptography |
Pretty dang easy (3) |
196 |
Thin Air
|
Enumeration |
Functioning brain required (4) |
84 |
Unusual Translation
|
Cryptography |
Moderate (5) |
42 |
What goes there?
|
Math Puzzles |
Easy as pie (2) |
286 |
What's that say? I
|
Word Games |
Just plain silly (1) |
366 |
What's that say? II
|
Word Games |
Just plain silly (1) |
208 |
What's that say? III
|
Word Games |
Just plain silly (1) |
306 |
What's that say? IV
|
Word Games |
Just plain silly (1) |
213 |
What's that say? V
|
Word Games |
Just plain silly (1) |
247 |
Wheel of Fortune
|
Cryptography |
Moderate (5) |
89 |
Where ya coming from?
|
Enumeration |
Pretty dang easy (3) |
148 |
Who's the custodian?
|
Programming |
Functioning brain required (4) |
77 |
World War I
|
Cryptography |
Pretty dang easy (3) |
54 |
World War I v.2.0
|
Cryptography |
Functioning brain required (4) |
30 |