Skip to main content

Intel Codex

Synced from an Obsidian vault

For graph and advanced features, download the full Intel Codex Vault and open it in Obsidian.

What is Intel Codex?

Intel Codex is an operational manual for digital investigators, security analysts, and OSINT practitioners, containing:

  • Standard Operating Procedures (SOPs) for investigations and security assessments
  • Platform-specific guides for social media and communications
  • Case studies with practical applications
  • Malware analysis and penetration testing methods
  • Legal, ethical, and OPSEC frameworks

All content reflects current best practices and is actively maintained.

📊 Quick Stats

Total SOPs: 20+ Categories: Investigations (16) | Security (13) | CTF (9)


🎯 First Time Here?

Start with these essentials before any investigation:

  1. Legal & EthicsMust read - Compliance and boundaries
  2. OPSEC PlanningCritical - Protect your identity
  3. Investigation Workflow ← Visual guide to the complete process
  4. OSINT Glossary ← Learn the terminology

Then explore:


🔍 Investigations

Platform-Specific Guides

Investigation Techniques

Investigation Cases & Templates


🛡️ Security & Malware Analysis

Core Analysis & Research

Pentesting & Vulnerability Research


🎯 Common Workflows

Starting an Investigation

  1. Review Legal & Ethics ← Read first
  2. Check OPSEC Planning ← Protect yourself
  3. Choose platform: Platform SOPs
  4. Log everything
  5. Write report

Malware Analysis Workflow

  1. Malware Analysis SOP ← Follow step-by-step
  2. Reverse Engineering ← For deeper analysis
  3. Hash Generation ← For identification

Forensics Investigation

  1. Forensics Investigation ← Full methodology
  2. Hash Generation ← Evidence integrity
  3. Malware Analysis ← If malware is found

Web Pentesting

  1. Web App Security ← OWASP Top 10
  2. Bug Bounty ← If reporting
  3. Vuln Research ← For 0-days

Binary Exploitation / CTF

  1. Reverse Engineering
  2. Vulnerability Research
  3. Cryptography Analysis
  4. CTF Methodology

Mobile Security Testing

  1. Mobile Security (iOS/Android)
  2. Reverse Engineering ← For native code
  3. Crypto Analysis ← For crypto flaws

IoT / Firmware Analysis

  1. Firmware Reverse Engineering
  2. Reverse Engineering ← For binaries
  3. Vuln Research