Skip to content

Latest commit

 

History

History
144 lines (115 loc) · 8.8 KB

File metadata and controls

144 lines (115 loc) · 8.8 KB
title Intel Codex
sidebar_label Intel Codex Overview
sidebar_position 1
description Comprehensive collection of OSINT investigation techniques, security procedures, and real-world case studies from the field.

:::info What is Intel Codex?

Intel Codex is an operational manual for digital investigators, security analysts, and OSINT practitioners, containing:

  • Standard Operating Procedures (SOPs) for investigations and security assessments
  • Platform-specific guides for social media and communications
  • Case studies with practical applications
  • Malware analysis and penetration testing methods
  • Legal, ethical, and OPSEC frameworks

All content reflects current best practices and is actively maintained.

:::

📊 Quick Stats

Total SOPs: 41+ Categories: Investigations (20) | Security (21) | CTF (9)


🎯 First Time Here?

Start with these essentials before any investigation:

  1. [[intel-codex/Investigations/Techniques/sop-legal-ethics|Legal & Ethics]] ← Must read - Compliance and boundaries
  2. [[intel-codex/Investigations/Techniques/sop-opsec-plan|OPSEC Planning]] ← Critical - Protect your identity
  3. Investigation Workflow ← Visual guide to the complete process
  4. OSINT Glossary ← Learn the terminology

Then explore:

  • [[intel-codex/Investigations/Platforms/Platforms-Index|Platform Guides]] for specific social media investigations
  • Case Studies for real-world examples

🔍 Investigations

Platform-Specific Guides

  • [[intel-codex/Investigations/Platforms/sop-platform-twitter-x|Twitter/X]] | [[intel-codex/Investigations/Platforms/sop-platform-instagram|Instagram]] | [[intel-codex/Investigations/Platforms/sop-platform-telegram|Telegram]]
  • [[intel-codex/Investigations/Platforms/sop-platform-discord|Discord]] | [[intel-codex/Investigations/Platforms/sop-platform-linkedin|LinkedIn]] | [[intel-codex/Investigations/Platforms/sop-platform-reddit|Reddit]]
  • [[intel-codex/Investigations/Platforms/sop-platform-tiktok|TikTok]] | [[intel-codex/Investigations/Platforms/sop-platform-bluesky|Bluesky]]
  • [[intel-codex/Investigations/Platforms/Platforms-Index|Full Platforms Index]]

Investigation Techniques

  • [[intel-codex/Investigations/Techniques/sop-legal-ethics|Legal & Ethics]] - Read before every investigation
  • [[intel-codex/Investigations/Techniques/sop-opsec-plan|OPSEC Planning]] - Protect investigator identity
  • [[intel-codex/Investigations/Techniques/sop-entity-dossier|Entity Dossier Building]]
  • [[intel-codex/Investigations/Techniques/sop-collection-log|Collection Logging]]
  • [[intel-codex/Investigations/Techniques/sop-image-video-osint|Image & Video Analysis]]
  • [[intel-codex/Investigations/Techniques/sop-web-dns-whois-osint|Web, DNS & WHOIS]]
  • [[intel-codex/Investigations/Techniques/sop-financial-aml-osint|Financial & AML]]
  • [[intel-codex/Investigations/Techniques/sop-blockchain-investigation|Blockchain Investigation]]
  • [[intel-codex/Investigations/Techniques/sop-mixer-tracing|Mixer & Privacy-Pool Tracing]]
  • [[intel-codex/Investigations/Techniques/sop-darkweb-investigation|Darkweb Investigation]]
  • [[intel-codex/Investigations/Techniques/sop-reporting-packaging-disclosure|Reporting & Disclosure]]
  • [[intel-codex/Investigations/Techniques/sop-sensitive-crime-intake-escalation|Sensitive Crime Escalation]]
  • [[intel-codex/Investigations/Techniques/Techniques-Index|Full Techniques Index]]

Investigation Cases & Templates


🛡️ Security & Malware Analysis

Core Analysis & Research

  • [[intel-codex/Security/Analysis/sop-malware-analysis|Malware Analysis]]
  • [[intel-codex/Security/Analysis/sop-reverse-engineering|Reverse Engineering]]
  • [[intel-codex/Security/Analysis/sop-forensics-investigation|Forensics Investigation]]
  • [[intel-codex/Security/Analysis/sop-cryptography-analysis|Cryptography Analysis]]
  • [[intel-codex/Security/Analysis/sop-hash-generation-methods|Hash Generation Methods]]
  • [[intel-codex/Security/Analysis/sop-smart-contract-audit|Smart Contract Audit]]
  • [[intel-codex/Security/Analysis/sop-cloud-forensics|Cloud Forensics]]
  • [[intel-codex/Security/Analysis/sop-saas-log-forensics|SaaS Log Forensics]]
  • [[intel-codex/Security/Analysis/sop-email-bec-forensics|Email & BEC Forensics]]
  • [[intel-codex/Security/Analysis/Analysis-Index|Full Analysis Index]]

Pentesting & Vulnerability Research

  • [[intel-codex/Security/Pentesting/sop-web-application-security|Web Application Security]]
  • [[intel-codex/Security/Pentesting/sop-mobile-security|Mobile Security (iOS/Android)]]
  • [[intel-codex/Security/Pentesting/sop-firmware-reverse-engineering|Firmware Reverse Engineering]]
  • [[intel-codex/Security/Pentesting/sop-vulnerability-research|Vulnerability Research]]
  • [[intel-codex/Security/Pentesting/sop-ad-pentest|Active Directory Pentesting]]
  • [[intel-codex/Security/Pentesting/sop-linux-pentest|Linux Pentesting]]
  • [[intel-codex/Security/Pentesting/sop-bug-bounty|Bug Bounty Methodology]]
  • [[intel-codex/Security/Pentesting/sop-detection-evasion-testing|Detection & Evasion Testing]]
  • [[intel-codex/Security/Pentesting/sop-cloud-pentest|Cloud Pentesting (AWS/Azure/GCP)]]
  • [[intel-codex/Security/Pentesting/sop-wireless-rf-pentest|Wireless & RF Pentesting]]
  • [[intel-codex/Security/Pentesting/sop-container-k8s-pentest|Container & Kubernetes Pentesting]]
  • [[intel-codex/Security/Pentesting/Pentesting-Index|Full Pentesting Index]]

🎯 Common Workflows

Starting an Investigation

  1. Review [[intel-codex/Investigations/Techniques/sop-legal-ethics|Legal & Ethics]] ← Read first
  2. Check [[intel-codex/Investigations/Techniques/sop-opsec-plan|OPSEC Planning]] ← Protect yourself
  3. Choose platform: [[intel-codex/Investigations/Platforms/Platforms-Index|Platform SOPs]]
  4. [[intel-codex/Investigations/Techniques/sop-collection-log|Log everything]]
  5. [[intel-codex/Investigations/Techniques/sop-reporting-packaging-disclosure|Write report]]

Malware Analysis Workflow

  1. [[intel-codex/Security/Analysis/sop-malware-analysis|Malware Analysis SOP]] ← Follow step-by-step
  2. [[intel-codex/Security/Analysis/sop-reverse-engineering|Reverse Engineering]] ← For deeper analysis
  3. [[intel-codex/Security/Analysis/sop-hash-generation-methods|Hash Generation]] ← For identification

Forensics Investigation

  1. [[intel-codex/Security/Analysis/sop-forensics-investigation|Forensics Investigation]] ← Full methodology
  2. [[intel-codex/Security/Analysis/sop-hash-generation-methods|Hash Generation]] ← Evidence integrity
  3. [[intel-codex/Security/Analysis/sop-malware-analysis|Malware Analysis]] ← If malware is found

Web Pentesting

  1. [[intel-codex/Security/Pentesting/sop-web-application-security|Web App Security]] ← OWASP Top 10
  2. [[intel-codex/Security/Pentesting/sop-bug-bounty|Bug Bounty]] ← If reporting
  3. [[intel-codex/Security/Pentesting/sop-vulnerability-research|Vuln Research]] ← For 0-days

Binary Exploitation / CTF

  1. [[intel-codex/Security/Analysis/sop-reverse-engineering|Reverse Engineering]]
  2. [[intel-codex/Security/Pentesting/sop-vulnerability-research|Vulnerability Research]]
  3. [[intel-codex/Security/Analysis/sop-cryptography-analysis|Cryptography Analysis]]
  4. [[intel-codex/CTF/CTF_Challenge_Methodology|CTF Methodology]]

Mobile Security Testing

  1. [[intel-codex/Security/Pentesting/sop-mobile-security|Mobile Security (iOS/Android)]]
  2. [[intel-codex/Security/Analysis/sop-reverse-engineering|Reverse Engineering]] ← For native code
  3. [[intel-codex/Security/Analysis/sop-cryptography-analysis|Crypto Analysis]] ← For crypto flaws

IoT / Firmware Analysis

  1. [[intel-codex/Security/Pentesting/sop-firmware-reverse-engineering|Firmware Reverse Engineering]]
  2. [[intel-codex/Security/Analysis/sop-reverse-engineering|Reverse Engineering]] ← For binaries
  3. [[intel-codex/Security/Pentesting/sop-vulnerability-research|Vuln Research]]