account_circle
info
cake
Gears

A simple start to get the ball rolling. [100]

The Game Has to End

A puzzle in memory of... [300]

Cryptic Colors more_vert

Look at all the cryptic colors.. If you look really hard, you might start to see doubles... [300]

Cryptic Colorsclose

The emerging threats to information security are increasing at an alarming rate. The most influential and universal approach to counter such threats is encryption. Traditional encryption techniques use substitution and transposition. Substitution techniques map plaintext into ciphertext. In all traditional substitution techniques, characters, numbers and special symbols are substituted with other characters, numbers and special symbols.

Astrixxxxx

Why can't an asterisk just be an asterisk? Why does it have to mean anything??? [250]

The Morsey Pcap more_vert

Woah, that's quite the traffic there... Someone better look for some Answers... [325]

The Morsey Pcapclose

This puzzle requires the included file. There is no puzzle page associated with this challenge. BTW, all zip passwords are "artofcodes"

Uncomfortable Silences

Why do we feel it's necessary to yak about bulls**t in order to be comfortable? [400]

The Modern Monk Maze

"The lines. They're all... diagonal!" Anyways... who doesn't love a good bunch of lines. [200]

In This Together

Let's take a tour to remind ourselves we aren't alone in this world... [400]

The Perfect Pair

"There should be no such thing as boring mathematics." So let's hear those theories! [200]

Just This Once

Just remember that all rules must be followed... Or else... =( [450]

Bottom Up

There's no reason for ... redundancy ... So let's keep it to a minimum. [500]

Throwback

Sometimes it's nice to take a trip down memory lane. [400]

The BEST One

[450]

© Copyright 2020