| title | Intel Codex |
|---|---|
| sidebar_label | Intel Codex Overview |
| sidebar_position | 1 |
| description | Comprehensive collection of OSINT investigation techniques, security procedures, and real-world case studies from the field. |
:::info What is Intel Codex?
Intel Codex is an operational manual for digital investigators, security analysts, and OSINT practitioners, containing:
- Standard Operating Procedures (SOPs) for investigations and security assessments
- Platform-specific guides for social media and communications
- Case studies with practical applications
- Malware analysis and penetration testing methods
- Legal, ethical, and OPSEC frameworks
All content reflects current best practices and is actively maintained.
:::
Total SOPs: 41+ Categories: Investigations (20) | Security (21) | CTF (9)
Start with these essentials before any investigation:
- [[intel-codex/Investigations/Techniques/sop-legal-ethics|Legal & Ethics]] ← Must read - Compliance and boundaries
- [[intel-codex/Investigations/Techniques/sop-opsec-plan|OPSEC Planning]] ← Critical - Protect your identity
- Investigation Workflow ← Visual guide to the complete process
- OSINT Glossary ← Learn the terminology
Then explore:
- [[intel-codex/Investigations/Platforms/Platforms-Index|Platform Guides]] for specific social media investigations
- Case Studies for real-world examples
- [[intel-codex/Investigations/Platforms/sop-platform-twitter-x|Twitter/X]] | [[intel-codex/Investigations/Platforms/sop-platform-instagram|Instagram]] | [[intel-codex/Investigations/Platforms/sop-platform-telegram|Telegram]]
- [[intel-codex/Investigations/Platforms/sop-platform-discord|Discord]] | [[intel-codex/Investigations/Platforms/sop-platform-linkedin|LinkedIn]] | [[intel-codex/Investigations/Platforms/sop-platform-reddit|Reddit]]
- [[intel-codex/Investigations/Platforms/sop-platform-tiktok|TikTok]] | [[intel-codex/Investigations/Platforms/sop-platform-bluesky|Bluesky]]
- [[intel-codex/Investigations/Platforms/Platforms-Index|Full Platforms Index]]
- [[intel-codex/Investigations/Techniques/sop-legal-ethics|Legal & Ethics]] - Read before every investigation
- [[intel-codex/Investigations/Techniques/sop-opsec-plan|OPSEC Planning]] - Protect investigator identity
- [[intel-codex/Investigations/Techniques/sop-entity-dossier|Entity Dossier Building]]
- [[intel-codex/Investigations/Techniques/sop-collection-log|Collection Logging]]
- [[intel-codex/Investigations/Techniques/sop-image-video-osint|Image & Video Analysis]]
- [[intel-codex/Investigations/Techniques/sop-web-dns-whois-osint|Web, DNS & WHOIS]]
- [[intel-codex/Investigations/Techniques/sop-financial-aml-osint|Financial & AML]]
- [[intel-codex/Investigations/Techniques/sop-blockchain-investigation|Blockchain Investigation]]
- [[intel-codex/Investigations/Techniques/sop-mixer-tracing|Mixer & Privacy-Pool Tracing]]
- [[intel-codex/Investigations/Techniques/sop-darkweb-investigation|Darkweb Investigation]]
- [[intel-codex/Investigations/Techniques/sop-reporting-packaging-disclosure|Reporting & Disclosure]]
- [[intel-codex/Investigations/Techniques/sop-sensitive-crime-intake-escalation|Sensitive Crime Escalation]]
- [[intel-codex/Investigations/Techniques/Techniques-Index|Full Techniques Index]]
- Investigation Cases - Complete examples, templates, student exercises
- Case Template - Blank case structure for new investigations
- Example Case - Full cryptocurrency scam investigation
- Investigation Workflow - Visual process guide with flowcharts
- OSINT Glossary - 100+ terms defined
- Student Exercises - Hands-on practice (3 exercises)
- [[intel-codex/Security/Analysis/sop-malware-analysis|Malware Analysis]]
- [[intel-codex/Security/Analysis/sop-reverse-engineering|Reverse Engineering]]
- [[intel-codex/Security/Analysis/sop-forensics-investigation|Forensics Investigation]]
- [[intel-codex/Security/Analysis/sop-cryptography-analysis|Cryptography Analysis]]
- [[intel-codex/Security/Analysis/sop-hash-generation-methods|Hash Generation Methods]]
- [[intel-codex/Security/Analysis/sop-smart-contract-audit|Smart Contract Audit]]
- [[intel-codex/Security/Analysis/sop-cloud-forensics|Cloud Forensics]]
- [[intel-codex/Security/Analysis/sop-saas-log-forensics|SaaS Log Forensics]]
- [[intel-codex/Security/Analysis/sop-email-bec-forensics|Email & BEC Forensics]]
- [[intel-codex/Security/Analysis/Analysis-Index|Full Analysis Index]]
- [[intel-codex/Security/Pentesting/sop-web-application-security|Web Application Security]]
- [[intel-codex/Security/Pentesting/sop-mobile-security|Mobile Security (iOS/Android)]]
- [[intel-codex/Security/Pentesting/sop-firmware-reverse-engineering|Firmware Reverse Engineering]]
- [[intel-codex/Security/Pentesting/sop-vulnerability-research|Vulnerability Research]]
- [[intel-codex/Security/Pentesting/sop-ad-pentest|Active Directory Pentesting]]
- [[intel-codex/Security/Pentesting/sop-linux-pentest|Linux Pentesting]]
- [[intel-codex/Security/Pentesting/sop-bug-bounty|Bug Bounty Methodology]]
- [[intel-codex/Security/Pentesting/sop-detection-evasion-testing|Detection & Evasion Testing]]
- [[intel-codex/Security/Pentesting/sop-cloud-pentest|Cloud Pentesting (AWS/Azure/GCP)]]
- [[intel-codex/Security/Pentesting/sop-wireless-rf-pentest|Wireless & RF Pentesting]]
- [[intel-codex/Security/Pentesting/sop-container-k8s-pentest|Container & Kubernetes Pentesting]]
- [[intel-codex/Security/Pentesting/Pentesting-Index|Full Pentesting Index]]
- Review [[intel-codex/Investigations/Techniques/sop-legal-ethics|Legal & Ethics]] ← Read first
- Check [[intel-codex/Investigations/Techniques/sop-opsec-plan|OPSEC Planning]] ← Protect yourself
- Choose platform: [[intel-codex/Investigations/Platforms/Platforms-Index|Platform SOPs]]
- [[intel-codex/Investigations/Techniques/sop-collection-log|Log everything]]
- [[intel-codex/Investigations/Techniques/sop-reporting-packaging-disclosure|Write report]]
- [[intel-codex/Security/Analysis/sop-malware-analysis|Malware Analysis SOP]] ← Follow step-by-step
- [[intel-codex/Security/Analysis/sop-reverse-engineering|Reverse Engineering]] ← For deeper analysis
- [[intel-codex/Security/Analysis/sop-hash-generation-methods|Hash Generation]] ← For identification
- [[intel-codex/Security/Analysis/sop-forensics-investigation|Forensics Investigation]] ← Full methodology
- [[intel-codex/Security/Analysis/sop-hash-generation-methods|Hash Generation]] ← Evidence integrity
- [[intel-codex/Security/Analysis/sop-malware-analysis|Malware Analysis]] ← If malware is found
- [[intel-codex/Security/Pentesting/sop-web-application-security|Web App Security]] ← OWASP Top 10
- [[intel-codex/Security/Pentesting/sop-bug-bounty|Bug Bounty]] ← If reporting
- [[intel-codex/Security/Pentesting/sop-vulnerability-research|Vuln Research]] ← For 0-days
- [[intel-codex/Security/Analysis/sop-reverse-engineering|Reverse Engineering]]
- [[intel-codex/Security/Pentesting/sop-vulnerability-research|Vulnerability Research]]
- [[intel-codex/Security/Analysis/sop-cryptography-analysis|Cryptography Analysis]]
- [[intel-codex/CTF/CTF_Challenge_Methodology|CTF Methodology]]
- [[intel-codex/Security/Pentesting/sop-mobile-security|Mobile Security (iOS/Android)]]
- [[intel-codex/Security/Analysis/sop-reverse-engineering|Reverse Engineering]] ← For native code
- [[intel-codex/Security/Analysis/sop-cryptography-analysis|Crypto Analysis]] ← For crypto flaws
- [[intel-codex/Security/Pentesting/sop-firmware-reverse-engineering|Firmware Reverse Engineering]]
- [[intel-codex/Security/Analysis/sop-reverse-engineering|Reverse Engineering]] ← For binaries
- [[intel-codex/Security/Pentesting/sop-vulnerability-research|Vuln Research]]