| Migration (Taking a dump) | 23 hours after release, 12 years ago (2013-09-28 23:50:56) | 50 | 
          
          
            | Vectors (Taking a dump) | 21 hours after release, 12 years ago (2013-09-28 21:40:15) | 200 | 
          
          
            | Kits (Taking a dump) | 17 hours after release, 12 years ago (2013-09-28 17:11:17) | 100 | 
          
          
            | banned2 (unixy stuff / misc) |  15 hours after release, 12 years ago (2013-09-28 15:29:43) | 300 | 
          
          
            | Mysterious messages (Networx) |  14 hours after release, 12 years ago (2013-09-28 14:50:04) | 150 | 
          
          
            | D-d-d-d-do you have full access? (The revenge) |  12 hours after release, 12 years ago (2013-09-28 12:12:31) | 350 | 
          
          
            | Like a thief in the night (The revenge) |  11 hours after release, 12 years ago (2013-09-28 11:20:37) | 250 | 
          
          
            | Become a moderator (The revenge) |  10 hours after release, 12 years ago (2013-09-28 10:21:15) | 350 | 
          
          
            | pie (Exploitation) |  8 hours after release, 12 years ago (2013-09-28 08:50:47) | 450 | 
          
          
            | banned (unixy stuff / misc) |  7 hours after release, 12 years ago (2013-09-28 07:05:01) | 50 | 
          
          
            | Blackbox (Reverse Engineering / Crypto) |  6 hours after release, 12 years ago (2013-09-28 06:12:48) | 400 | 
          
          
            | gzinfo (Exploitation) |  6 hours after release, 12 years ago (2013-09-28 06:04:05) | 300 | 
          
          
            | Tracing (Taking a dump) | 3 hours after release, 12 years ago (2013-09-28 03:51:12) | 50 | 
          
          
            | hash (Reverse Engineering / Crypto) |  2 hours after release, 12 years ago (2013-09-28 02:35:18) | 300 | 
          
          
            | The controller (Reverse Engineering / Crypto) | 2 hours after release, 12 years ago (2013-09-28 02:25:56) | 100 | 
          
          
            | The remote (Networx) | 1 hour after release, 12 years ago (2013-09-28 01:56:36) | 100 | 
          
          
            | basics2 (Exploitation) |  1 hour after release, 12 years ago (2013-09-28 01:16:15) | 200 | 
          
          
            | Help the NSA (Networx) | 59 minutes after release, 12 years ago (2013-09-28 00:59:38) | 50 | 
          
          
            | Log in (The revenge) |  33 minutes after release, 12 years ago (2013-09-28 00:33:35) | 70 | 
          
          
            | Hidden messages (The revenge) |  30 minutes after release, 12 years ago (2013-09-28 00:30:55) | 50 | 
          
          
            | rope (Reverse Engineering / Crypto) | 18 minutes after release, 12 years ago (2013-09-28 00:18:48) | 20 | 
          
          
            | basics (Exploitation) |  15 minutes after release, 12 years ago (2013-09-28 00:15:49) | 100 |