1.
Algorithm Abyss
2.
Cache Carnage
3.
Brute Force
4.
Bit Blaster
5.
Binary Breaker
6.
Binary Blood
7.
Cache Crash
8.
Circuit Surge
9.
Cyber Cipher
10.
Debug Demon
11.
Cryptic Bytes
12.
Data Demon
13.
Debugging Destruction
14.
Denial of Data
15.
Debug Descent
16.
Digital Phantom
17.
Devil's Protocol
18.
Decrypted Nightmare
19.
Errorcode Execution
20.
Error Entity
21.
Encryption Error
22.
Firewall Frenzy
23.
Firewall Fury
24.
Fragment Fight
25.
Gateway Ghost
26.
Fragmented Future
27.
Gateway Grind
28.
Ghost in the Data
29.
Glitch God
30.
Hacked Hellscape
31.
Hex Hack
32.
Hexadecimal Hell
33.
Hexagon Hellfire
34.
Infected Input
35.
Hyperlink Havoc
36.
Hyperlink Hijack
37.
Input Inferno
38.
Java Juggernaut
39.
Kernel Chaos
40.
Kernel Killer
41.
Kernel Knightmare
42.
Logic Bomb
43.
Logic Loop
44.
Malware Madness
45.
Malware Minion
46.
Machine Mayhem
47.
Network Necromancer
48.
Network Nightmare
49.
Neural Nemesis
50.
Override Overload
51.
Packet Predator
52.
Packet Punch
53.
Pixelated Predator
54.
Quantum Quake
55.
Phishing Phantasm
56.
Quantum Override
57.
Programmed Purgatory
58.
RAM Raider
59.
Quantum Quarantine
60.
RAM Reaper
61.
Reboot Rebellion
62.
Red Eye Virus
63.
Recursive Rumble
64.
Rootkit Raider
65.
Scripted Sins
66.
Silicon Slayer
67.
Server Surge
68.
Shadow of Code
69.
Source Code Sins
70.
Socket Surge
71.
Systematic Sabotage
72.
Trojan Terror
73.
Underworld Uplink
74.
Trojan Throne
75.
Unstable Uplink
76.
Trojan Trouble
77.
URL Underworld
78.
Virtual Villain
79.
Virus Vortex
80.
Virtual Virus
81.
Web Weaver
82.
Virus Vendetta
83.
Wormhole Warfare
84.
Yottabyte Yell
85.
Zero Code Zone
86.
Zero Day Doom
87.
Zero Day Zulu

