UIL-Computer-Science-Wagner-HS / UIL_Computer_Science_SolutionsLinks
Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.
☆10Updated last year
Alternatives and similar repositories for UIL_Computer_Science_Solutions
Users that are interested in UIL_Computer_Science_Solutions are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 4 months ago
- Challenges and writeups for the US Cyber Open for 2024☆19Updated last year
- Debian 8 hardening checklist for CyberPatriot. Should work on other distros.☆17Updated 6 years ago
- Create Password lists for cracking lyrical passwords☆15Updated last year
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆26Updated 8 years ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆17Updated 2 months ago
- List of resources for aspiring contributors related to technologies we use here at hackarmour☆11Updated 2 years ago
- A Metamorphic virus 🌺☆17Updated 3 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆49Updated last year
- the IoT and OT (Operational Technology) Honeypot☆25Updated last year
- Docker container for quickly analyzing Linux malware☆81Updated 2 years ago
- Turn binaries into music☆55Updated last year
- ☆36Updated last year
- This contains notes, slides, and code for my Strange Loop talk☆30Updated 2 years ago
- .wav files of various oscilliscope graphics tests☆14Updated 2 years ago
- A .txt file containing the MD5 hashes for malware gathered from multiple sources☆20Updated 4 years ago
- Powerful Android pentesting toolkit running fully on rooted devices.☆38Updated last week
- Drawing inspiration from Andrej Karpathy’s iconic lecture, "Let’s Build GPT: From Scratch, in Code, Spelled Out", this project takes you …☆20Updated 10 months ago
- Wordlists compiled from Bible verses☆17Updated 3 years ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆93Updated this week
- A diverse collection of privacy, security, and FOSS resources in English and Arabic, encompassing tools, extensions, operating systems, e…☆36Updated 4 months ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 3 years ago
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆19Updated 10 months ago
- Jupyter Notebooks for the Blue Team☆36Updated 8 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- ☆58Updated 3 years ago
- C# Library and research notes for Windows 11 Notepad State Files☆19Updated 2 months ago
- Extensible vulnerable AI Bot to illustrate vulnerabilities in LLM applications.☆16Updated last year
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆43Updated last month