adminSpoofingCyberattackRootMalwareCloudExploitBotDataLogsAnonymousBlackHatKeyloggerNuclearEncryptionBreachGbpsDarkWebUnixSocialMediaPenetrationBugRansom-wareSpamBinaryScriptDomainVulnerabilityPhishingVirusEnd-UserPatchMainFrameIPTrackerVPNIntelligenceExtortion1337Next-GenTrojanAIChineseMachineLearningZero-DayBruteforceLinuxCyberWhiteHatHacking(as averb)LegacyadminSpoofingCyberattackRootMalwareCloudExploitBotDataLogsAnonymousBlackHatKeyloggerNuclearEncryptionBreachGbpsDarkWebUnixSocialMediaPenetrationBugRansom-wareSpamBinaryScriptDomainVulnerabilityPhishingVirusEnd-UserPatchMainFrameIPTrackerVPNIntelligenceExtortion1337Next-GenTrojanAIChineseMachineLearningZero-DayBruteforceLinuxCyberWhiteHatHacking(as averb)Legacy

6969Boiiii!!!1!!!! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. admin
  2. Spoofing
  3. Cyber attack
  4. Root
  5. Malware
  6. Cloud
  7. Exploit
  8. Bot
  9. Data Logs
  10. Anonymous
  11. Black Hat
  12. Keylogger
  13. Nuclear
  14. Encryption
  15. Breach
  16. Gbps
  17. Dark Web
  18. Unix
  19. Social Media
  20. Penetration
  21. Bug
  22. Ransom-ware
  23. Spam
  24. Binary Script
  25. Domain
  26. Vulnerability
  27. Phishing
  28. Virus
  29. End-User
  30. Patch
  31. Main Frame
  32. IP Tracker
  33. VPN
  34. Intelligence
  35. Extortion
  36. 1337
  37. Next-Gen
  38. Trojan
  39. AI
  40. Chinese
  41. Machine Learning
  42. Zero-Day
  43. Brute force
  44. Linux
  45. Cyber
  46. White Hat
  47. Hacking (as a verb)
  48. Legacy