Skip to main content
Synced from an Obsidian vault

For graph and advanced features, download the full Intel Codex Vault and open it in Obsidian.

Security Analysis SOPs

This directory contains Standard Operating Procedures (SOPs) for security analysis, reverse engineering, and cryptographic analysis.

Available Analysis SOPs

Purpose

These SOPs provide standardized procedures for:

  • Analyzing malicious software and binaries
  • Reverse engineering applications and protocols
  • Evaluating cryptographic implementations
  • Generating and verifying file hashes for integrity
  • Conducting digital forensics investigations and evidence preservation

Common Workflows

Malware Analysis

  1. Malware Analysis - Full analysis workflow
  2. Reverse Engineering - For deeper code analysis
  3. Hash Generation - For sample identification

Binary Analysis

  1. Reverse Engineering - Disassembly and decompilation
  2. Cryptography Analysis - For crypto routines
  3. Hash Generation - For file verification

Incident Response & Forensics

  1. Digital Forensics Investigation - Evidence collection and preservation
  2. Malware Analysis - Analyze malicious artifacts
  3. Reverse Engineering - Deep dive on custom malware
  4. Hash Generation - Evidence integrity verification