Why I Built Intel Codex
As an autodidact solver, developer, architect, and CTF jeopardy competitor working across digital investigations and security operations, I kept running into the same problem: fragmented knowledge. Every investigation meant digging through scattered bookmarks, old notes, and half-remembered techniques.
Every new team member needed months to learn the same procedures. Every case required rebuilding the same templates from scratch.
The Problem
The OSINT and security communities have incredible tools and techniques, but they're spread across:- Reddit threads from 2019
- Twitter screenshots
- Personal notes that make sense to no one else
- Tribal knowledge that lives in someone's head
When you're mid-investigation and need to remember the proper chain of custody procedure, or the legal boundaries for scraping a social platform, or how to structure a financial AML case — you shouldn't need to Google for 20 minutes and hope you find the right answer.
The Solution
Intel Codex is the operational manual I wish I'd had from day one. It's:- 20+ SOPs covering everything from Twitter investigations to Active Directory pentesting
- Platform-specific guides for the major social networks
- Case studies showing real investigation workflows
- Legal and ethical frameworks built into every procedure
- Copy-paste ready commands for Windows, Linux, and macOS
It's designed for the moment you're in the middle of work and need answers fast.
Beyond OSINT: Full-Spectrum Security
One deliberate choice was treating security operations as a first-class citizen alongside OSINT investigations.The Security Index bridges both offensive and defensive work:
Analysis domain:- Malware analysis (static/dynamic, IOC extraction)
- Reverse engineering (binary analysis, protocol dissection)
- Forensics investigation (incident response, timeline analysis)
- Cryptography analysis (implementation audits)
- AI/ML vulnerability research (adversarial attacks, prompt injection)
- Infrastructure (Linux privilege escalation, Active Directory compromise)
- Applications (Web app security, mobile security, firmware reverse engineering)
- Offensive research (vulnerability discovery, bug bounty, detection evasion)
Intel Codex gives you the operational procedures for all of it, with proper authorization checklists, evidence handling standards, and responsible disclosure frameworks built in.
Why Obsidian
I built this in Obsidian because knowledge isn't linear. Investigations jump between platforms, techniques, and evidence types. You need to see connections: how OPSEC planning relates to platform SOPs, how entity dossiers connect to collection logs, how malware analysis ties into forensic investigations.
Plain text Markdown means it's searchable, versionable, and doesn't lock you into proprietary formats.
What's Next
Intel Codex reflects current best practices and stays actively maintained. As investigation techniques evolve, so does the manual. The 6 learning paths give structured progression from beginner to advanced across different specializations.
If you're doing digital investigations, security analysis, or OSINT work, it's available now at github.com/gl0bal01/intel-codex or partialy on the website here.
The goal isn't to teach you everything about OSINT or security — it's to give you the operational procedures so you can focus on the actual investigation instead of figuring out how to do it properly.
Looking for tools? I also maintain curated start pages with essential resources:
- OSINT Starter Collection — Investigation tools, search engines, and platform resources
- Red Team Collection — Pentesting tools, exploit databases, and offensive security resources
Start with the fundamentals: Legal & Ethics Review and OPSEC Planning. Everything else builds from there.
