Code: chstg
Version: 1.0
Based on OWASP methodology skeleton like WSTG
- 01 — Information Gathering (Without Internal Physical Access)
- 02 — Boot Security
- 03 — Firmware Security
- 04 — Physical Access Testing
- 05 — Internal Information Gathering (With Internal Physical Access)
- 06 — Debug Interfaces
- 07 — DMA Attacks
- 08 — TPM and Chain of Trust
- 09 — Memory Attacks
- 10 — Disk Encryption and Storage
- 11 — Post-Exploitation and Persistence
This methodology was structured and formatted with the assistance of Artificial Intelligence (AI) tools.
The AI was used exclusively for formatting, structure harmonization, and language refinement, in order to maintain a consistent methodology framework across all sections.
Due to dyslexia, writing and maintaining large structured documentation is particularly challenging. AI assistance was therefore used as a support tool for editorial consistency and readability.
Important:
All technical content, testing steps, attack paths, methodology design, and security concepts were conceived, designed, and validated manually without AI-generated methodology decisions.
AI did not design, invent, or define any testing procedure contained in this guide.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


