UIL-Computer-Science-Wagner-HS / UIL_Computer_Science_SolutionsLinks
Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.
☆10Updated last year
Alternatives and similar repositories for UIL_Computer_Science_Solutions
Users that are interested in UIL_Computer_Science_Solutions are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago
- GenCyberCoin is a project sponsored by NSA/NSF GenCyber program. A demo is deployed here:☆9Updated last year
- Challenges and writeups for the US Cyber Open for 2024☆19Updated last year
- UFSIT scripts and tools for hardening and auditing☆14Updated 2 months ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆25Updated 8 years ago
- Debian 8 hardening checklist for CyberPatriot. Should work on other distros.☆17Updated 5 years ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆17Updated last week
- Compress a Python script to a command-line one-liner☆77Updated 2 years ago
- redpwn's challenge deployment system☆28Updated last year
- A reborn collection of tools/scripts for solving the Cicada 3301 puzzle.☆21Updated 3 weeks ago
- This contains notes, slides, and code for my Strange Loop talk☆29Updated last year
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆44Updated 3 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆32Updated 2 years ago
- SIGPwny's websites and club content monorepo☆15Updated last week
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆13Updated 10 months ago
- Collection of some Scripts that I have created for the CyberPatriot Competition☆16Updated 8 years ago
- Create Password lists for cracking lyrical passwords☆15Updated last year
- Found resources in my malware researching adventure.☆16Updated 2 years ago
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆19Updated 8 months ago
- A script to download all the challenges and files from a CTFd instance☆21Updated 9 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- A place in which I put various resources from my classes, presentations, and videos.☆44Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆46Updated 11 months ago
- LA CTF hosted by ACM Cyber & Psi Beta Rho! Website for the largest annual cybersecurity competition at UCLA! Whether you are tackling you…☆14Updated 5 months ago
- Hacking training websites list and tutorials☆29Updated 3 months ago
- ImaginaryCTF is a platform that brings the beauty of CTF Competitions to discord, releasing a challenge every day☆43Updated 2 months ago
- Making a brainf*ck compiler in 24 hours☆13Updated 2 years ago
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆88Updated 8 months ago
- List of resources for aspiring contributors related to technologies we use here at hackarmour☆11Updated 2 years ago