1337 Linux IP Tracker Cloud Cyber Phishing Penetration White Hat Black Hat Anonymous Breach Machine Learning Legacy Bug Social Media Exploit Intelligence Chinese Gbps Binary Script End- User VPN Dark Web Hacking (as a verb) Spoofing Trojan Domain Brute force Next- Gen Patch Unix Malware Root Data Logs Spam Virus Keylogger Main Frame Extortion Encryption Ransom- ware Bot Vulnerability Nuclear Zero- Day admin Cyber attack AI 1337 Linux IP Tracker Cloud Cyber Phishing Penetration White Hat Black Hat Anonymous Breach Machine Learning Legacy Bug Social Media Exploit Intelligence Chinese Gbps Binary Script End- User VPN Dark Web Hacking (as a verb) Spoofing Trojan Domain Brute force Next- Gen Patch Unix Malware Root Data Logs Spam Virus Keylogger Main Frame Extortion Encryption Ransom- ware Bot Vulnerability Nuclear Zero- Day admin Cyber attack AI
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1337
Linux
IP Tracker
Cloud
Cyber
Phishing
Penetration
White Hat
Black Hat
Anonymous
Breach
Machine Learning
Legacy
Bug
Social Media
Exploit
Intelligence
Chinese
Gbps
Binary Script
End-User
VPN
Dark Web
Hacking (as a verb)
Spoofing
Trojan
Domain
Brute force
Next-Gen
Patch
Unix
Malware
Root
Data Logs
Spam
Virus
Keylogger
Main Frame
Extortion
Encryption
Ransom-ware
Bot
Vulnerability
Nuclear
Zero-Day
admin
Cyber attack
AI