AnonymousAISpamVirusBotVPNRootChineseBlackHatZero-DayGbpsMachineLearningLinuxMalwareWhiteHatPenetrationDomainKeyloggerBruteforce1337IPTrackerPhishingNuclearBinaryScriptUnixLegacyVulnerabilityBreachPatchEnd-UserDarkWebMainFrameHacking(as averb)DataLogsSocialMediaBugRansom-wareSpoofingNext-GenCloudTrojanEncryptionCyberExploitadminExtortionIntelligenceCyberattackAnonymousAISpamVirusBotVPNRootChineseBlackHatZero-DayGbpsMachineLearningLinuxMalwareWhiteHatPenetrationDomainKeyloggerBruteforce1337IPTrackerPhishingNuclearBinaryScriptUnixLegacyVulnerabilityBreachPatchEnd-UserDarkWebMainFrameHacking(as averb)DataLogsSocialMediaBugRansom-wareSpoofingNext-GenCloudTrojanEncryptionCyberExploitadminExtortionIntelligenceCyberattack

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Anonymous
  2. AI
  3. Spam
  4. Virus
  5. Bot
  6. VPN
  7. Root
  8. Chinese
  9. Black Hat
  10. Zero-Day
  11. Gbps
  12. Machine Learning
  13. Linux
  14. Malware
  15. White Hat
  16. Penetration
  17. Domain
  18. Keylogger
  19. Brute force
  20. 1337
  21. IP Tracker
  22. Phishing
  23. Nuclear
  24. Binary Script
  25. Unix
  26. Legacy
  27. Vulnerability
  28. Breach
  29. Patch
  30. End-User
  31. Dark Web
  32. Main Frame
  33. Hacking (as a verb)
  34. Data Logs
  35. Social Media
  36. Bug
  37. Ransom-ware
  38. Spoofing
  39. Next-Gen
  40. Cloud
  41. Trojan
  42. Encryption
  43. Cyber
  44. Exploit
  45. admin
  46. Extortion
  47. Intelligence
  48. Cyber attack