BugAnonymousChineseExploitEnd-UserBruteforceIntelligenceMainFrameVirusadminWhiteHatEncryptionBlackHatVPNGbpsTrojanMachineLearningLegacy1337UnixSocialMediaAICyberattackDataLogsMalwarePatchSpoofingHacking(as averb)IPTrackerRansom-wareRootDarkWebBotLinuxZero-DayBinaryScriptVulnerabilityPenetrationNext-GenPhishingCloudBreachDomainCyberSpamKeyloggerExtortionNuclearBugAnonymousChineseExploitEnd-UserBruteforceIntelligenceMainFrameVirusadminWhiteHatEncryptionBlackHatVPNGbpsTrojanMachineLearningLegacy1337UnixSocialMediaAICyberattackDataLogsMalwarePatchSpoofingHacking(as averb)IPTrackerRansom-wareRootDarkWebBotLinuxZero-DayBinaryScriptVulnerabilityPenetrationNext-GenPhishingCloudBreachDomainCyberSpamKeyloggerExtortionNuclear

6969Boiiii!!!1!!!! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Bug
  2. Anonymous
  3. Chinese
  4. Exploit
  5. End-User
  6. Brute force
  7. Intelligence
  8. Main Frame
  9. Virus
  10. admin
  11. White Hat
  12. Encryption
  13. Black Hat
  14. VPN
  15. Gbps
  16. Trojan
  17. Machine Learning
  18. Legacy
  19. 1337
  20. Unix
  21. Social Media
  22. AI
  23. Cyber attack
  24. Data Logs
  25. Malware
  26. Patch
  27. Spoofing
  28. Hacking (as a verb)
  29. IP Tracker
  30. Ransom-ware
  31. Root
  32. Dark Web
  33. Bot
  34. Linux
  35. Zero-Day
  36. Binary Script
  37. Vulnerability
  38. Penetration
  39. Next-Gen
  40. Phishing
  41. Cloud
  42. Breach
  43. Domain
  44. Cyber
  45. Spam
  46. Keylogger
  47. Extortion
  48. Nuclear