UIL-Computer-Science-Wagner-HS / UIL_Computer_Science_SolutionsLinks
Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.
☆10Updated last year
Alternatives and similar repositories for UIL_Computer_Science_Solutions
Users that are interested in UIL_Computer_Science_Solutions are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago
- Debian 8 hardening checklist for CyberPatriot. Should work on other distros.☆17Updated 6 years ago
- Challenges and writeups for the US Cyber Open for 2024☆21Updated last year
- Cyber Patriot automated scripts for 2018-2019 competition. YOU MAY USE THESE SCRIPTS FOR INSPIRATION BUT YOU CANNOT BLATANTLY COPY/PASTE/…☆12Updated 7 years ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 8 months ago
- Create Password lists for cracking lyrical passwords☆16Updated last year
- Vulnerability and security bulletins related to Palantir software products.☆13Updated 2 years ago
- 📒 Quick script to generate a table of contents from a markdown document☆15Updated 2 years ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆32Updated 9 years ago
- Security. Automation. Analytics.☆59Updated 2 years ago
- "Hacks" for online blooket games. Does not require outside information (ie. url, gamepin, sign in information) blooket hacks☆14Updated 2 years ago
- Collection of some Scripts that I have created for the CyberPatriot Competition☆17Updated 8 years ago
- ☆44Updated last year
- A .txt file containing the MD5 hashes for malware gathered from multiple sources☆21Updated 4 years ago
- A repository to collaborate on the UX rebuild of Have I Been Pwned☆69Updated 5 months ago
- A memorial site for Hackers and Infosec people who have passed☆135Updated last month
- This informative guide offers essential tips to avoid legal trouble with law enforcement by educating readers on their rights and ways to…☆30Updated 2 months ago
- Honeyscanner: A vulnerability analyzer for honeypots☆56Updated last month
- Supporting code for exploiting the RISC-V GhostWrite vulnerability☆81Updated last year
- Malware detection tool for Windows PE files based on DFIR ORC data☆10Updated 4 months ago
- An analytical framework for network traffic and behavioral analytics☆22Updated 2 years ago
- Security advisories for vulnerabilities☆70Updated last year
- 🔏 A web presentation for explaining secure coding best practices☆25Updated 2 years ago
- Lists of Social Media, News sites, and other things to follow☆42Updated last year
- Security Information and Event Management in Minecraft☆118Updated 3 years ago
- Every single password leaked, from 4 to 32 chars☆81Updated 7 months ago
- Set of tools and documentation for leveraging private APNs for mobile network traffic analysis☆28Updated last year
- Windows Event ID list in CSV format☆27Updated 6 years ago
- king of the hill cybersecurity competition☆31Updated 3 years ago
- How long will it take to crack a hash ?☆31Updated 5 years ago