UIL-Computer-Science-Wagner-HS / UIL_Computer_Science_SolutionsLinks
Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.
☆10Updated last year
Alternatives and similar repositories for UIL_Computer_Science_Solutions
Users that are interested in UIL_Computer_Science_Solutions are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 6 months ago
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆13Updated last year
- Debian 8 hardening checklist for CyberPatriot. Should work on other distros.☆17Updated 6 years ago
- Challenges and writeups for the US Cyber Open for 2024☆20Updated last year
- List of resources for aspiring contributors related to technologies we use here at hackarmour☆11Updated 2 years ago
- SIGPwny's websites and club content monorepo☆15Updated this week
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆17Updated 4 months ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆32Updated 2 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆35Updated 3 years ago
- Drawing inspiration from Andrej Karpathy’s iconic lecture, "Let’s Build GPT: From Scratch, in Code, Spelled Out", this project takes you …☆27Updated last year
- Making a brainf*ck compiler in 24 hours☆13Updated 2 years ago
- Collection of some Scripts that I have created for the CyberPatriot Competition☆17Updated 8 years ago
- Compress a Python script to a command-line one-liner☆77Updated 2 years ago
- ☆11Updated last year
- Hayden Housen's solutions to the 2022 PicoCTF Competition☆10Updated 3 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 11 months ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆28Updated 3 years ago
- Unofficial and insecure Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website☆193Updated 7 months ago
- CTF101, a wiki-project documenting Capture The Flag techniques.☆277Updated last week
- Crappy Python code to render a QR code as "plaintext" with Unicode☆39Updated last year
- Find RSA primes in files☆20Updated 3 years ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆18Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- A script to download all the challenges and files from a CTFd instance☆24Updated last year
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆20Updated last year
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆58Updated last year
- Honeyscanner: A vulnerability analyzer for honeypots☆52Updated last year
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆32Updated 8 years ago