UIL-Computer-Science-Wagner-HS / UIL_Computer_Science_SolutionsLinks
Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.
☆10Updated last year
Alternatives and similar repositories for UIL_Computer_Science_Solutions
Users that are interested in UIL_Computer_Science_Solutions are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 8 months ago
- Challenges and writeups for the US Cyber Open for 2024☆21Updated last year
- A script to download all the challenges and files from a CTFd instance☆25Updated last year
- Debian 8 hardening checklist for CyberPatriot. Should work on other distros.☆17Updated 6 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- Response Filter Denial of Service (RFDoS) Experimental Scanner☆16Updated last year
- ☆12Updated 2 years ago
- Hardened your Windows OS against forensics analysis☆22Updated last year
- List of resources for aspiring contributors related to technologies we use here at hackarmour☆12Updated 2 years ago
- ☆11Updated last year
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆18Updated last month
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆12Updated 2 years ago
- Official IANA IP blocks for each country | IPV4 and IPV6 | TEXT | CSV | JSON☆69Updated this week
- Collection of my Security Blueprints & Guides☆52Updated 4 months ago
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆60Updated this week
- king of the hill cybersecurity competition☆31Updated 3 years ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆32Updated 9 years ago
- 📒 Quick script to generate a table of contents from a markdown document☆15Updated 2 years ago
- Create Password lists for cracking lyrical passwords☆16Updated last year
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆17Updated 3 years ago
- redpwn's challenge deployment system☆28Updated 2 years ago
- Control a Fanimation Slinger V2 RF Fan via an ESP8266 and a TI CC1101 chip over MQTT☆11Updated last year
- Supporting code for exploiting the RISC-V GhostWrite vulnerability☆81Updated last year
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆35Updated 9 months ago
- Docker container for quickly analyzing Linux malware☆84Updated 2 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆33Updated 2 years ago
- ☆22Updated 4 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆56Updated last month
- This contains notes, slides, and code for my Infosec World talk☆17Updated 2 years ago