UIL-Computer-Science-Wagner-HS / UIL_Computer_Science_Solutions
Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.
☆9Updated 9 months ago
Alternatives and similar repositories for UIL_Computer_Science_Solutions:
Users that are interested in UIL_Computer_Science_Solutions are comparing it to the libraries listed below
- Challenges created for the US Cyber Open 2023 (Season 3)☆11Updated last year
- Challenges and writeups for the US Cyber Open for 2024☆17Updated 7 months ago
- GenCyberCoin is a project sponsored by NSA/NSF GenCyber program. A demo is deployed here:☆8Updated 11 months ago
- UFSIT scripts and tools for hardening and auditing☆11Updated this week
- Debian 8 hardening checklist for CyberPatriot. Should work on other distros.☆16Updated 5 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆33Updated 5 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆38Updated last year
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆11Updated last year
- General purpose attack-defense range for zero-config deployment☆20Updated 3 months ago
- Collection of some Scripts that I have created for the CyberPatriot Competition☆16Updated 7 years ago
- Comprehensive writeups for all of CyberStart / Cyber FastTrack challenges☆27Updated 5 months ago
- A .txt file containing the MD5 hashes for malware gathered from multiple sources☆19Updated 3 years ago
- Public repository containing materials for various malware-related streams.☆34Updated 2 weeks ago
- Create polyglots for different file types☆15Updated last year
- Collection of YARA rules designed for usage through VirusTotal.com.☆66Updated 9 months ago
- A utility for working with Android OTA updates☆24Updated 7 months ago
- CTF writeups maintained by TeamShakti members.☆25Updated 9 months ago
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆13Updated last year
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆31Updated 3 years ago
- ☆24Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆14Updated last month
- ☆38Updated 9 months ago
- A feed of malware samples curated from threat intelligence sources.☆25Updated last year
- Embed a ZIP or JAR file within a PNG image to create a tweetable and "executable" PNG-ZIP/JAR polyglot. CLI / Web tool.☆23Updated last month
- Create Password lists for cracking lyrical passwords☆14Updated 8 months ago
- ImaginaryCTF is a platform that brings the beauty of CTF Competitions to discord, releasing a challenge every day☆43Updated 6 months ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 7 months ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆22Updated 8 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated last year