UIL-Computer-Science-Wagner-HS / UIL_Computer_Science_Solutions
Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.
☆10Updated 11 months ago
Alternatives and similar repositories for UIL_Computer_Science_Solutions:
Users that are interested in UIL_Computer_Science_Solutions are comparing it to the libraries listed below
- UFSIT scripts and tools for hardening and auditing☆13Updated 3 weeks ago
- GenCyberCoin is a project sponsored by NSA/NSF GenCyber program. A demo is deployed here:☆8Updated last year
- Challenges created for the US Cyber Open 2023 (Season 3)☆11Updated last year
- Challenges and writeups for the US Cyber Open for 2024☆18Updated 10 months ago
- Collection of some Scripts that I have created for the CyberPatriot Competition☆16Updated 7 years ago
- Cyber Patriot automated scripts for 2018-2019 competition. YOU MAY USE THESE SCRIPTS FOR INSPIRATION BUT YOU CANNOT BLATANTLY COPY/PASTE/…☆12Updated 6 years ago
- LA CTF hosted by ACM Cyber & Psi Beta Rho! Website for the largest annual cybersecurity competition at UCLA! Whether you are tackling you…☆14Updated last month
- Honeyscanner: A vulnerability analyzer for honeypots☆38Updated 7 months ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Updated 2 years ago
- Create Password lists for cracking lyrical passwords☆14Updated 11 months ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆25Updated 8 years ago
- ☆10Updated last year
- Compiler for the Jack Programming Language☆17Updated 5 months ago
- Debian 8 hardening checklist for CyberPatriot. Should work on other distros.☆17Updated 5 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- CLI tool for interacting with GPT, analyze local files, etc.☆16Updated last month
- Calculates metrics about the current state of the tldr pages☆14Updated this week
- This contains notes, slides, and code for my Infosec World talk☆20Updated last year
- Notes and slides for my 2024 Objective by the Sea talk on iOS decompilation☆30Updated 4 months ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆12Updated last year
- redpwn's challenge deployment system☆25Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆14Updated 3 months ago
- Fuzzinglabs's audits, publications, workshops and reports☆11Updated 2 months ago
- ☆33Updated last year
- ☆11Updated last year
- ☆38Updated last year
- Simulate Windows EXE for Malware Research!☆18Updated 7 months ago
- AstroCrypt is a powerful and versatile tool designed to assist you in both cracking hashed passwords and identifying the hash type used t…☆15Updated last year
- Insecure reference example for the 2024 Collegiate eCTF☆30Updated last year
- Challenges and other resources for magpieCTF 2021.☆19Updated 2 years ago