Intel Codex
Comprehensive knowledge base covering osint, reverse engineering, malware analysis, cryptography and intelligence frameworks for security researchers
Intel Codex
What is Intel Codex?
Intel Codex is an operational manual for digital investigators, security analysts, and OSINT practitioners, containing:
- Standard Operating Procedures (SOPs) for investigations and security assessments
- Platform-specific guides for social media and communications
- Case studies with practical applications
- Malware analysis and penetration testing methods
- Legal, ethical, and OPSEC frameworks
All content reflects current best practices and is actively maintained.
š By the Numbers
28+ SOPs across all disciplines | 16 Investigation Guides | 13 Security Procedures | 9 CTF Resources
Main Sections
OSINT Investigations
Comprehensive investigation techniques, platform guides, and operational procedures for conducting digital investigations.
Quick Links:
- Investigation Techniques Index - Complete guide to investigation workflows
- Platform-Specific SOPs - Twitter/X, Instagram, Telegram, LinkedIn, Reddit, TikTok, Bluesky
- Investigation Techniques - Entity dossiers, collection logs, legal/ethics, OPSEC
Core SOPs:
- Legal & Ethics Review - Pre-investigation compliance
- OPSEC Planning - Operational security for investigations
- Entity Dossier - Person/org profiling templates
- Collection Log - Evidence tracking and chain of custody
- Image/Video OSINT - Reverse search, geolocation, metadata
- Web/DNS/WHOIS - Infrastructure analysis
- Financial/AML OSINT - Blockchain, company records, sanctions
Case Studies
Real-world investigation workflows and example cases demonstrating practical application of techniques.
Available Cases:
- Investigation Workflow Guide - Standard investigation process
- Case Management README - How to structure and document cases
- 2025-001: Example Investigation - Crypto scammer investigation walkthrough
- Glossary - Common terms and definitions
What You'll Learn:
- How to structure an investigation from start to finish
- Proper evidence collection and documentation
- Entity profiling and relationship mapping
- Escalation procedures for sensitive cases
- Report writing and disclosure
Security Operations
Malware analysis procedures, penetration testing methodologies, and security assessment frameworks.
Penetration Testing
Comprehensive guides for offensive security operations across multiple domains.
Quick Links:
- Pentesting Index - Complete pentesting guide
Available SOPs:
- Linux Penetration Testing
- Active Directory Security
- Web Application Security
- Mobile Security Assessment
- Vulnerability Research
- Bug Bounty Methodology
- Firmware Reverse Engineering
- Detection Evasion Testing
Security Analysis Procedures
Procedures for analyzing malicious software, cryptographic systems, and security implementations.
Quick Links:
- Analysis Index - Complete analysis guide
Available SOPs:
- Malware Analysis - Static and dynamic analysis procedures
- Forensics Investigation - Precedures and workflow
- Reverse Engineering - Binary analysis techniques
- Cryptography Analysis - Crypto system evaluation
- Hash Generation Methods - Evidence integrity verification
CTF & Hands-On Practice
Resources for Capture The Flag competitions and practical skill development.
Available Resources:
- Student Exercises - Hands-on investigation practice scenarios
- CTF Challenge Methodology - Systematic approach to CTF competitions
- Writeups - Documented solutions from real CTF challenges
- Practice Guides - Step-by-step tutorials for common challenge types
Skills Covered:
- Binary exploitation and reverse engineering
- Web application vulnerabilities
- Cryptography challenges
- Digital forensics puzzles
How to Use Intel Codex
For Investigators
- Foundations: Legal & Ethics + OPSEC first
- Platform: Choose from Platform SOPs
- Document: Use Collection Log and Entity Dossier
- Learn: Study Case Studies and Student Exercises
For Security Analysts
- Start here: Pentesting Index or Malware Analysis SOP
- Evidence integrity: Hash Generation
- Specialized: Choose SOPs based on assessment scope
For Researchers
Browse Investigation Index and Case Studies for real-world applications.
š§ Navigation Tips
- Sidebar - Explore all sections hierarchically
- Search (top right) - Find specific techniques or platforms
- Index pages - Comprehensive navigation hubs:
- Tags - Discover related content across sections
š Learning Paths
6 specialized learning tracks - Choose based on your career goals
Path 1: Investigations Specialist
Timeline: 6 weeks
- Week 1-2: Legal & Ethics, OPSEC, Platform basics
- Week 3-4: Advanced techniques (Image/Video, Financial)
- Week 5-6: Practice investigations, report writing
Path 2: Security Analyst
Timeline: 6 weeks
- Week 1-2: Malware Analysis fundamentals
- Week 3-4: Reverse Engineering basics
- Week 5-6: Advanced malware analysis, IOC generation
Path 3: Penetration Tester
Timeline: 6 weeks
- Week 1-2: Web Application Security (OWASP Top 10)
- Week 3-4: Linux/AD pentesting
- Week 5-6: Mobile/Firmware security testing
Path 4: Bug Bounty Hunter
Timeline: 6 weeks
- Week 1-2: Web App Security + Bug Bounty SOP
- Week 3-4: Vulnerability Research techniques
- Week 5-6: Practice on bug bounty platforms (HackerOne, Bugcrowd)
Path 5: CTF Competitor
Timeline: 6 weeks
- Week 1-2: Reverse Engineering + Cryptography
- Week 3-4: Binary exploitation, Web challenges
- Week 5-6: Practice CTFs (HTB, TryHackMe, picoCTF)
Path 6: Digital Forensics Investigator
Timeline: 6 weeks
- Week 1-2: Forensics Investigation fundamentals + Hash Generation
- Week 3-4: Malware Analysis basics + incident response
- Week 5-6: Memory forensics, timeline analysis, and evidence reporting
š Quick Start
Prerequisites
- Obsidian v1.0 or higher
- Git (optional, for cloning)
Installation
# Clone the repository
git clone https://github.com/gl0bal01/intel-codex.git
# Open in Obsidian
# File ā Open Vault ā Select the cloned folder
First Steps
- Open the vault in Obsidian
- Review the Main Sections above to understand the structure
- Before any investigation, review Legal & Ethics SOP
- Choose a Learning Path based on your goals
Repository Structure
ObsidianVault/
āāā README.md # ā You are here (main navigation hub)
āāā Investigations/ # OSINT techniques & platform guides
ā āāā Platforms/ # Platform-specific SOPs (Twitter, Telegram, Instagram, etc.)
ā āāā Techniques/ # Investigation methods (OPSEC, legal, image analysis, etc.)
āāā Security/ # Malware analysis & pentesting
ā āāā Analysis/ # Malware, forensic, reverse engineering, cryptography
ā āāā Pentesting/ # Web, mobile, AD, vulnerability research
āāā Cases/ # Investigation management & examples
āāā Case-Template/ # Blank case structure for new investigations
āāā 2025-001-Example-Investigation/ # Complete case example
⨠What Makes This Different
- Copy-Paste Ready - All commands provided for Windows/Linux/macOS
- Heavily Cross-Referenced - SOPs link to related procedures and workflows
- Learning Paths Included - 6 structured 6-week learning tracks
- Real Examples - Complete investigation case examples
- Templates Included - Blank case structure for starting investigations
- Legal/Ethical First - Every SOP includes legal boundaries and ethical considerations
- Practical over theoretical - Every SOP is based on real-world operations
- OPSEC by default - Operational security considerations in every procedure
Content Philosophy
Intel Codex follows these principles:
- Practical over theoretical: Every SOP is based on real-world operations
- Legal and ethical first: All techniques emphasize compliance and responsible use
- OPSEC by default: Operational security considerations in every procedure
- Living documentation: Regular updates based on field experience
- Template-driven: Reusable templates for consistent documentation
Related Resources
Want to strengthen your OSINT fundamentals? Explore OSINT Foundations for deep dives into theory, sockpuppet tradecraft, and strategic intelligence frameworks.
Explore more from gl0bal01.com:
- Cybersecurity ā Core security concepts, defensive strategies, and best practices
- Reverse Engineering ā Tutorials on binary analysis, deobfuscation, and reverse engineering techniques
- AI ā Resources on artificial intelligence, machine learning, and applied automation
- Cheatsheets ā Concise reference materials and command quick guides
š¤ Contributing
Contributions welcome! See CONTRIBUTING.md for detailed guidelines on:
- How to submit changes
- File naming and folder structure conventions
- Content requirements and style guide
- Review process
Quick summary: Fork ā Create branch ā Make changes ā Update navigation ā Submit PR
āļø Legal & Ethics
IMPORTANT: This vault is for educational and authorized investigative purposes only.
- Always review Legal & Ethics SOP before investigations
- Respect privacy laws (GDPR, CCPA, local regulations)
- Only investigate with proper authorization
- Escalate sensitive crimes appropriately (see Escalation SOP)
Disclaimer: Users are responsible for compliance with applicable laws.
š License
Licensed under the MIT License. If you use or fork this vault, please provide attribution.
Built with Obsidian - A powerful knowledge base on top of plain text Markdown files.
How to Install
- Download the ZIP or clone the repository
- Open the folder as a vault in Obsidian (File ā Open Vault)
- Obsidian will prompt you to install required plugins
Stats
Stars
12
Forks
2
License
MIT
Last updated 5mo ago
Categories
Tags