Hacking (as a verb) Penetration Spam Brute force Chinese Extortion Vulnerability Cyber attack Spoofing Dark Web Main Frame Gbps IP Tracker Root Black Hat Breach End- User Ransom- ware White Hat Unix Legacy Patch Next- Gen Bot Virus Domain Malware AI admin Exploit Machine Learning VPN Nuclear 1337 Binary Script Zero- Day Anonymous Linux Keylogger Phishing Data Logs Encryption Intelligence Cloud Trojan Social Media Cyber Bug Hacking (as a verb) Penetration Spam Brute force Chinese Extortion Vulnerability Cyber attack Spoofing Dark Web Main Frame Gbps IP Tracker Root Black Hat Breach End- User Ransom- ware White Hat Unix Legacy Patch Next- Gen Bot Virus Domain Malware AI admin Exploit Machine Learning VPN Nuclear 1337 Binary Script Zero- Day Anonymous Linux Keylogger Phishing Data Logs Encryption Intelligence Cloud Trojan Social Media Cyber Bug
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Hacking (as a verb)
Penetration
Spam
Brute force
Chinese
Extortion
Vulnerability
Cyber attack
Spoofing
Dark Web
Main Frame
Gbps
IP Tracker
Root
Black Hat
Breach
End-User
Ransom-ware
White Hat
Unix
Legacy
Patch
Next-Gen
Bot
Virus
Domain
Malware
AI
admin
Exploit
Machine Learning
VPN
Nuclear
1337
Binary Script
Zero-Day
Anonymous
Linux
Keylogger
Phishing
Data Logs
Encryption
Intelligence
Cloud
Trojan
Social Media
Cyber
Bug