UIL-Computer-Science-Wagner-HS / UIL_Computer_Science_SolutionsLinks
Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.
☆10Updated last year
Alternatives and similar repositories for UIL_Computer_Science_Solutions
Users that are interested in UIL_Computer_Science_Solutions are comparing it to the libraries listed below
Sorting:
- UFSIT scripts and tools for hardening and auditing☆13Updated last week
- Challenges created for the US Cyber Open 2023 (Season 3)☆11Updated last year
- GenCyberCoin is a project sponsored by NSA/NSF GenCyber program. A demo is deployed here:☆8Updated last year
- Collection of some Scripts that I have created for the CyberPatriot Competition☆16Updated 7 years ago
- Debian 8 hardening checklist for CyberPatriot. Should work on other distros.☆17Updated 5 years ago
- Challenges and writeups for the US Cyber Open for 2024☆19Updated 11 months ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆25Updated 8 years ago
- ☆10Updated last year
- Create Password lists for cracking lyrical passwords☆14Updated last year
- Cyber Patriot automated scripts for 2018-2019 competition. YOU MAY USE THESE SCRIPTS FOR INSPIRATION BUT YOU CANNOT BLATANTLY COPY/PASTE/…☆12Updated 6 years ago
- Toolkit for creating cryptographic figures and videos.☆32Updated last year
- ☆39Updated last year
- SIGPwny's websites and club content monorepo☆14Updated 3 weeks ago
- Official-IANA-IP-blocks for each country | IPV4 and IPV6 | TEXT | CSV | JSON☆44Updated last week
- 🪟 Windows ➡️ A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during u…☆35Updated 3 weeks ago
- ☆34Updated last year
- Drawing inspiration from Andrej Karpathy’s iconic lecture, "Let’s Build GPT: From Scratch, in Code, Spelled Out", this project takes you …☆14Updated 6 months ago
- Solves zybooks answers☆11Updated 6 years ago
- Set of tools and documentation for leveraging private APNs for mobile network traffic analysis☆24Updated 9 months ago
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆13Updated 2 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Resources from B-Sides Bloomington OSINT Workshop☆12Updated 8 months ago
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆16Updated 5 months ago
- Curated list of tools, techniques and resources related to Apple Security (macOS, iOS, iPadOS, tvOS, watchOS) aimed to help people with a…☆54Updated 5 months ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 2 years ago
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024☆10Updated last year
- Example of CVE-2024-24576 use case.☆57Updated last year
- details about DIAL protocol vulnerabilities☆28Updated last year
- Waterloo CEMC CCC Solutions (Canadian Computing Competition) in Python and C++☆65Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 4 months ago