muuk's repositories
olist213_Information_Security_Books
150本信息安全方面的书籍书籍(持续更新)
cheatsheets_and_ctf-notes
0xbro's cheatsheets and CTFs notes
android-penetration-testing-cheat-sheet
Work in progress...
asm-payloads-loaders
Desarrollo paso a paso de cargadores de payloads, escritos exclusivamente en lenguaje Ensamblador x86-64 para Linux, sin dependencias externas y utilizando solo syscalls. | Step-by-step development of payload loaders, written exclusively in x86-64 Assembly for Linux, with no external dependencies and using only syscalls.
awesome-edr-bypass
Awesome EDR Bypass Resources For Ethical Hacking
BlueToolkit
BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-enabled devices. Could be used in the vulnerability research, penetration testing and bluetooth hacking. We also collected and classified Bluetooth vulnerabilities in an "Awesome Bluetooth Security" way
bug-bounty-writeup
This repo contains different variants of Bug Bounty & Security & Pentest & Tech related Articles
daydayExp-pocs
daydayExp的漏洞POC仓库,慢慢更新...
DEFCON-33
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G LTE Routers
DeFi-Developer-Road-Map
DeFi Developer roadmap is a curated Developer handbook which includes a list of the best tools for DApps development, resources and references!
docs
Official API Documentation
IoTFirmwareAnalysisGuide
物联网设备安全测试指南
IOTsec-all-in-one
收集IOT安全相关资料
Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes
A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.
my-ctf-challenges
CTF challenges I created 🚩
reversingBits
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse engineers, and low-level programmers.
SecArchive
🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, ethical hacking, and penetration testing.
sekaictf-2025
🎵 Official source code and writeups for SekaiCTF 2025!
theAIMythbook
Ai迷思录(应用与安全指南)
Ultimate-RAT-Collection
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
underTheHoodOfExecutables
A guide that explains how programs transform from source code to executables. Deep dive into ELF format, linking processes, and binary optimization techniques. Perfect for systems programmers, C developers, and anyone interested in low-level programming concepts.
wikiwy876n
漏洞文库 wiki.wy876.cn
ZeroDaysCTF_2025_Public
Challenges & author writeups from ZeroDays CTF 2025.