Resources
A focused repository of cybersecurity checklists, playbooks, and practical guides curated by Het Mehta, built to assist security engineers, auditors, and practitioners in standardizing and scaling security efforts.
-
Android Application Pentesting Checklist
A complete and easy-to-follow checklist created to help security researchers during their security testing process. It covers important steps from planning and information gathering to finding vulnerabilities and writing reports—making sure nothing is missed and every test is done properly.
View Resource -
Thick Client Pentesting Checklist
A detailed checklist for thick client application penetration testing covering static, dynamic, network analysis, tools, and common vulnerabilities, with practical commands and code examples.
View Resource -
DevSecOps Pipeline Security Checklist
A detailed checklist for integrating security into every stage of the DevOps pipeline, covering tools, practices, and common vulnerabilities.
View Resource -
WebSocket Security Checklist
A practical WebSocket security pentesting checklist by Het Mehta — CSWSH, auth bypass, injection payloads, DoS, Burp Suite, wscat, wsrepl, and more.
View Resource -
ISO 27001:2022 Checklist
An ISO/IEC 27001:2022 complete reference checklist with 114 controls across 14 domains to 93 controls across 4 themes.
View Resource -
Zero Trust Architecture Implementation Checklist
This checklist is organised around the five CISA ZTMM pillars — Identity, Devices, Networks, Applications & Workloads, and Data — plus the three cross-cutting capabilities (Visibility & Analytics, Automation & Orchestration, and Governance) that run through all pillars.
View Resource -
Cybersecurity Roadmap
Complete Guide on starting your career in Cybersecurity.
View Resource -
DORA Checklist
Complete DORA Cybersecurity Checklist to Kickstart Your Career in Security.
View Resource -
GDPR Checklist
Complete GDPR Checklist to Kickstart Your Career in Data Security.
View Resource -
SOC2 TSC Checklist
Complete SOC 2 TSC Checklist for Security and Compliance Teams.
View Resource