Synced from an Obsidian vault
For graph and advanced features, download the full Intel Codex Vault and open it in Obsidian.
Security Analysis SOPs
This directory contains Standard Operating Procedures (SOPs) for security analysis, reverse engineering, and cryptographic analysis.
Available Analysis SOPs
- Malware Analysis
- Reverse Engineering
- Cryptography Analysis
- Hash Generation Methods
- Digital Forensics Investigation
Purpose
These SOPs provide standardized procedures for:
- Analyzing malicious software and binaries
- Reverse engineering applications and protocols
- Evaluating cryptographic implementations
- Generating and verifying file hashes for integrity
- Conducting digital forensics investigations and evidence preservation
Common Workflows
Malware Analysis
- Malware Analysis - Full analysis workflow
- Reverse Engineering - For deeper code analysis
- Hash Generation - For sample identification
Binary Analysis
- Reverse Engineering - Disassembly and decompilation
- Cryptography Analysis - For crypto routines
- Hash Generation - For file verification
Incident Response & Forensics
- Digital Forensics Investigation - Evidence collection and preservation
- Malware Analysis - Analyze malicious artifacts
- Reverse Engineering - Deep dive on custom malware
- Hash Generation - Evidence integrity verification
Navigation
- Return to Start
- See also: Pentesting SOPs