Intel Codex
Synced from an Obsidian vault
For graph and advanced features, download the full Intel Codex Vault and open it in Obsidian.
What is Intel Codex?
Intel Codex is an operational manual for digital investigators, security analysts, and OSINT practitioners, containing:
- Standard Operating Procedures (SOPs) for investigations and security assessments
- Platform-specific guides for social media and communications
- Case studies with practical applications
- Malware analysis and penetration testing methods
- Legal, ethical, and OPSEC frameworks
All content reflects current best practices and is actively maintained.
📊 Quick Stats
Total SOPs: 20+ Categories: Investigations (16) | Security (13) | CTF (9)
🎯 First Time Here?
Start with these essentials before any investigation:
- Legal & Ethics ← Must read - Compliance and boundaries
- OPSEC Planning ← Critical - Protect your identity
- Investigation Workflow ← Visual guide to the complete process
- OSINT Glossary ← Learn the terminology
Then explore:
- Platform Guides for specific social media investigations
- Case Studies for real-world examples
🔍 Investigations
Platform-Specific Guides
Investigation Techniques
- Legal & Ethics - Read before every investigation
- OPSEC Planning - Protect investigator identity
- Entity Dossier Building
- Collection Logging
- Image & Video Analysis
- Web, DNS & WHOIS
- Financial & AML
- Reporting & Disclosure
- Sensitive Crime Escalation
- Full Techniques Index
Investigation Cases & Templates
- Investigation Cases - Complete examples, templates, student exercises
- Case Template - Blank case structure for new investigations
- Example Case - Full cryptocurrency scam investigation
- Investigation Workflow - Visual process guide with flowcharts
- OSINT Glossary - 100+ terms defined
- Student Exercises - Hands-on practice (3 exercises)
🛡️ Security & Malware Analysis
Core Analysis & Research
- Malware Analysis
- Reverse Engineering
- Forensics Investigation
- Cryptography Analysis
- Hash Generation Methods
- Full Analysis Index
Pentesting & Vulnerability Research
- Web Application Security
- Mobile Security (iOS/Android)
- Firmware Reverse Engineering
- Vulnerability Research
- Active Directory Pentesting
- Linux Pentesting
- Bug Bounty Methodology
- Detection & Evasion Testing
- Full Pentesting Index
🎯 Common Workflows
Starting an Investigation
- Review Legal & Ethics ← Read first
- Check OPSEC Planning ← Protect yourself
- Choose platform: Platform SOPs
- Log everything
- Write report
Malware Analysis Workflow
- Malware Analysis SOP ← Follow step-by-step
- Reverse Engineering ← For deeper analysis
- Hash Generation ← For identification
Forensics Investigation
- Forensics Investigation ← Full methodology
- Hash Generation ← Evidence integrity
- Malware Analysis ← If malware is found
Web Pentesting
- Web App Security ← OWASP Top 10
- Bug Bounty ← If reporting
- Vuln Research ← For 0-days
Binary Exploitation / CTF
Mobile Security Testing
- Mobile Security (iOS/Android)
- Reverse Engineering ← For native code
- Crypto Analysis ← For crypto flaws
IoT / Firmware Analysis
- Firmware Reverse Engineering
- Reverse Engineering ← For binaries
- Vuln Research