DarkWebEnd-UserChineseLinuxRoot1337adminMainFrameBruteforceDomainExploitCyberattackSocialMediaCloudAnonymousUnixEncryptionWhiteHatPatchTrojanBinaryScriptSpamSpoofingNuclearIntelligenceExtortionMachineLearningNext-GenVPNBreachGbpsCyberAIVulnerabilityLegacyRansom-wareBlackHatBugVirusMalwareDataLogsPhishingBotHacking(as averb)IPTrackerKeyloggerZero-DayPenetrationDarkWebEnd-UserChineseLinuxRoot1337adminMainFrameBruteforceDomainExploitCyberattackSocialMediaCloudAnonymousUnixEncryptionWhiteHatPatchTrojanBinaryScriptSpamSpoofingNuclearIntelligenceExtortionMachineLearningNext-GenVPNBreachGbpsCyberAIVulnerabilityLegacyRansom-wareBlackHatBugVirusMalwareDataLogsPhishingBotHacking(as averb)IPTrackerKeyloggerZero-DayPenetration

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Dark Web
  2. End-User
  3. Chinese
  4. Linux
  5. Root
  6. 1337
  7. admin
  8. Main Frame
  9. Brute force
  10. Domain
  11. Exploit
  12. Cyber attack
  13. Social Media
  14. Cloud
  15. Anonymous
  16. Unix
  17. Encryption
  18. White Hat
  19. Patch
  20. Trojan
  21. Binary Script
  22. Spam
  23. Spoofing
  24. Nuclear
  25. Intelligence
  26. Extortion
  27. Machine Learning
  28. Next-Gen
  29. VPN
  30. Breach
  31. Gbps
  32. Cyber
  33. AI
  34. Vulnerability
  35. Legacy
  36. Ransom-ware
  37. Black Hat
  38. Bug
  39. Virus
  40. Malware
  41. Data Logs
  42. Phishing
  43. Bot
  44. Hacking (as a verb)
  45. IP Tracker
  46. Keylogger
  47. Zero-Day
  48. Penetration