UIL-Computer-Science-Wagner-HS / UIL_Computer_Science_SolutionsLinks
Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.
☆10Updated last year
Alternatives and similar repositories for UIL_Computer_Science_Solutions
Users that are interested in UIL_Computer_Science_Solutions are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 5 months ago
- Challenges and writeups for the US Cyber Open for 2024☆20Updated last year
- Debian 8 hardening checklist for CyberPatriot. Should work on other distros.☆17Updated 6 years ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆31Updated 8 years ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆17Updated 3 months ago
- Create Password lists for cracking lyrical passwords☆15Updated last year
- Cyber Patriot automated scripts for 2018-2019 competition. YOU MAY USE THESE SCRIPTS FOR INSPIRATION BUT YOU CANNOT BLATANTLY COPY/PASTE/…☆12Updated 7 years ago
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆17Updated last year
- This informative guide offers essential tips to avoid legal trouble with law enforcement by educating readers on their rights and ways to…☆26Updated last week
- Honeyscanner: A vulnerability analyzer for honeypots☆52Updated last year
- ☆38Updated 2 years ago
- A curated list of free and paid certifications, badges and courses☆16Updated last year
- Drawing inspiration from Andrej Karpathy’s iconic lecture, "Let’s Build GPT: From Scratch, in Code, Spelled Out", this project takes you …☆27Updated 11 months ago
- Every single password leaked, from 4 to 32 chars☆80Updated 4 months ago
- 📒 Quick script to generate a table of contents from a markdown document☆15Updated 2 years ago
- simple client-side in-browser binary analysis and hex dump☆89Updated 10 months ago
- List of resources for aspiring contributors related to technologies we use here at hackarmour☆11Updated 2 years ago
- An ongoing collection of awesome android security tools, software, libraries, learning tutorials, frameworks, academic and practical reso…☆29Updated 3 years ago
- Turn binaries into music☆59Updated last year
- A curated collection of scripts for kernel-related devops☆13Updated 2 years ago
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆20Updated 11 months ago
- ☆44Updated last year
- Simple Go Discord Bot☆23Updated 2 years ago
- IOCs from zLabs research☆32Updated 2 weeks ago
- LA CTF hosted by ACM Cyber & Psi Beta Rho! Website for the largest annual cybersecurity competition at UCLA! Whether you are tackling you…☆13Updated this week
- Supporting code for exploiting the RISC-V GhostWrite vulnerability☆80Updated last year
- Lists of Social Media, News sites, and other things to follow☆42Updated 11 months ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆382Updated last year
- Defund the Police. With repository stars⭐ and forks🍴☆20Updated last week