LegacyBugadmin1337BruteforceGbpsLinuxVulnerabilityExtortionNext-GenIntelligenceBlackHatDomainRansom-wareCyberEncryptionSpamCyberattackTrojanPhishingPatchZero-DayBinaryScriptVPNMainFrameSocialMediaDarkWebHacking(as averb)AnonymousCloudBreachBotWhiteHatSpoofingMalwareVirusKeyloggerPenetrationIPTrackerDataLogsChineseEnd-UserAIUnixNuclearMachineLearningExploitRootLegacyBugadmin1337BruteforceGbpsLinuxVulnerabilityExtortionNext-GenIntelligenceBlackHatDomainRansom-wareCyberEncryptionSpamCyberattackTrojanPhishingPatchZero-DayBinaryScriptVPNMainFrameSocialMediaDarkWebHacking(as averb)AnonymousCloudBreachBotWhiteHatSpoofingMalwareVirusKeyloggerPenetrationIPTrackerDataLogsChineseEnd-UserAIUnixNuclearMachineLearningExploitRoot

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Legacy
  2. Bug
  3. admin
  4. 1337
  5. Brute force
  6. Gbps
  7. Linux
  8. Vulnerability
  9. Extortion
  10. Next-Gen
  11. Intelligence
  12. Black Hat
  13. Domain
  14. Ransom-ware
  15. Cyber
  16. Encryption
  17. Spam
  18. Cyber attack
  19. Trojan
  20. Phishing
  21. Patch
  22. Zero-Day
  23. Binary Script
  24. VPN
  25. Main Frame
  26. Social Media
  27. Dark Web
  28. Hacking (as a verb)
  29. Anonymous
  30. Cloud
  31. Breach
  32. Bot
  33. White Hat
  34. Spoofing
  35. Malware
  36. Virus
  37. Keylogger
  38. Penetration
  39. IP Tracker
  40. Data Logs
  41. Chinese
  42. End-User
  43. AI
  44. Unix
  45. Nuclear
  46. Machine Learning
  47. Exploit
  48. Root