📄️ Security Analysis SOPs
Expert security analysis techniques: malware investigation, reverse engineering, cryptography audits, hash verification & threat intelligence research.
📄️ AI/ML Vulnerability & Evasion Testing SOP
Complete AI security testing: adversarial attacks, prompt injection, model extraction, LLM vulnerabilities & governance framework for red/blue teams.
📄️ Cryptography Analysis SOP
Crypto security assessment: cipher analysis, encryption audits, key management review & cryptographic vulnerability testing for secure implementations.
📄️ Digital Forensics Investigation SOP
Conduct digital forensics: disk imaging, memory analysis, artifact recovery, timeline creation & chain of custody. Tools: FTK, Autopsy, Volatility.
📄️ Hash Generation Methods for Evidence Integrity
Forensic hashing guide: SHA-256, MD5, file integrity verification, chain of custody & cryptographic hashing for digital evidence preservation.
📄️ Malware Analysis SOP
Complete malware analysis guide: static/dynamic analysis, sandbox setup, IOC extraction, YARA rules & threat intelligence for malware investigation.
📄️ Reverse Engineering
Binary reverse engineering: Ghidra, IDA Pro, disassembly, decompilation, debugging & exploit development for security research and CTF challenges.