A collection of self-contained, offline security audit checklists for penetration testers and red teamers. Each checklist covers a distinct target environment with ordered checks, ready-to-run commands, and built-in tooling support.
| Checklist | Target | Checks | Tools |
|---|---|---|---|
| AWS | Amazon Web Services environments | 9 | ScoutSuite, Pacu, enumerate-iam, cloudsplaining |
| Azure | Microsoft Azure cloud environments | 10 | ScoutSuite, ROADtools, AzureHound, PowerZure |
| Docker | Docker container environments | 34 | LinPEAS, DEEPCE, CDK, pspy, Lynis |
| GCP | Google Cloud Platform environments | 8 | ScoutSuite, gcloud CLI, GCPBucketBrute |
| Kubernetes | Kubernetes clusters | 9 | kube-hunter, Trivy, kube-bench, kubectl-who-can |
| Linux | Standalone Linux hosts | 12 | LinPEAS, pspy, Lynis |
| macOS | macOS endpoints and jump hosts | 10 | osquery, KnockKnock |
| Windows | Windows hosts and jump hosts | 33 | WinPEAS, PowerUp, Seatbelt, SharpHound, Mimikatz, LaZagne |
Every checklist in this repository is a single self-contained HTML file with no external dependencies. All features are shared across all checklists.
Workflow
- Ordered steps grouped by attack phase, each with a brief explanation of why the check matters
- Per-step access level badge — Low-priv, Root/Admin required, or Run as both
- Separate output fields for low-privileged and elevated runs where output genuinely differs
- Tool sections at the top with deployment commands and output capture alongside manual checks
Tracking
- Per-command checkboxes to track individual execution
- Checking the main step checkbox cascades to all sub-commands, and vice versa
- Progress bar covering both tools and manual checks
Output & Reporting
- All output fields auto-save to browser localStorage on every keystroke — nothing is lost on tab close or browser crash
- Credential redaction toggle — masks passwords, tokens, hashes, AWS keys, JWT tokens, and certificate blocks on export
- Manual redact selection — highlight any text in any output field and redact it in one click
- Export to Markdown — produces a structured
.mdreport with all steps, commands, and output - Export to PDF — prints the full checklist with all output field content correctly expanded
- Export filenames include the date and redaction state:
docker_audit_2026-03-01_redacted.md - Import Markdown — restores all checkboxes, per-command checkboxes, and output field content from a previously exported file
Customisation
- Additional checks section at the bottom of each checklist for engagement-specific steps
- Dark mode support
Download the checklist HTML file for your target environment and open it in any modern browser.
git clone https://github.com/0xsyr0/audit-checklists
cd audit-checklists
open docker_audit_checklist.html
No build step, no dependencies, no server required. Each file is fully self-contained.
audit-checklists/
├── README.md
├── aws_audit_checklist.html
├── azure_audit_checklist.html
├── docker_audit_checklist.html
├── gcp_audit_checklist.html
├── kubernetes_audit_checklist.html
├── linux_audit_checklist.html
├── macos_audit_checklist.html
├── windows_audit_checklist.html
└── assets/
└── preview.png
| Checklist | In Scope | Out of Scope |
|---|---|---|
| AWS | IAM privesc, S3, EC2 IMDS, Lambda, Secrets Manager, CloudTrail | AWS-native container orchestration |
| Azure | IAM, storage, Key Vault, IMDS, NSGs, conditional access | Azure DevOps, Intune |
| Docker | Container escape, socket abuse, namespace isolation, credential hunting inside containers | Kubernetes-specific workloads |
| GCP | IAM, GCS, GCE metadata, Cloud Functions, Secret Manager | GKE-specific checks (see Kubernetes) |
| Kubernetes | RBAC, service account abuse, pod escape, kubelet API, etcd, network policies | Cloud provider IAM integration |
| Linux | Standalone host privilege escalation, service enumeration, credential hunting | Container-specific checks (see Docker) |
| macOS | TCC bypass, persistence, Keychain access, SIP status | iOS / mobile |
| Windows | Local privilege escalation, AD enumeration, credential hunting, lateral movement prep | Domain controller compromise steps |
These checklists are intended for use by security professionals during authorised engagements only. All techniques documented here should only be executed against systems for which explicit written permission has been obtained. The authors accept no liability for unauthorised use.
MIT
