Skip to content

Comprehensive knowledge base covering osint, reverse engineering, malware analysis, cryptography and intelligence frameworks for security researchers

License

Notifications You must be signed in to change notification settings

gl0bal01/intel-codex

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

23 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Intel Codex

Obsidian License Contributions

What is Intel Codex?

Intel Codex is an operational manual for digital investigators, security analysts, and OSINT practitioners, containing:

  • Standard Operating Procedures (SOPs) for investigations and security assessments
  • Platform-specific guides for social media and communications
  • Case studies with practical applications
  • Malware analysis and penetration testing methods
  • Legal, ethical, and OPSEC frameworks

All content reflects current best practices and is actively maintained.

πŸ“Š By the Numbers

28+ SOPs across all disciplines | 16 Investigation Guides | 13 Security Procedures | 9 CTF Resources


Main Sections

OSINT Investigations

Comprehensive investigation techniques, platform guides, and operational procedures for conducting digital investigations.

Quick Links:

Core SOPs:


Case Studies

Real-world investigation workflows and example cases demonstrating practical application of techniques.

Available Cases:

What You'll Learn:

  • How to structure an investigation from start to finish
  • Proper evidence collection and documentation
  • Entity profiling and relationship mapping
  • Escalation procedures for sensitive cases
  • Report writing and disclosure

Security Operations

Malware analysis procedures, penetration testing methodologies, and security assessment frameworks.

Penetration Testing

Comprehensive guides for offensive security operations across multiple domains.

Quick Links:

Available SOPs:

Security Analysis Procedures

Procedures for analyzing malicious software, cryptographic systems, and security implementations.

Quick Links:

Available SOPs:


CTF & Hands-On Practice

Resources for Capture The Flag competitions and practical skill development.

Available Resources:

  • Student Exercises - Hands-on investigation practice scenarios
  • CTF Challenge Methodology - Systematic approach to CTF competitions
  • Writeups - Documented solutions from real CTF challenges
  • Practice Guides - Step-by-step tutorials for common challenge types

Skills Covered:

  • Binary exploitation and reverse engineering
  • Web application vulnerabilities
  • Cryptography challenges
  • Digital forensics puzzles

How to Use Intel Codex

For Investigators

  1. Foundations: Legal & Ethics + OPSEC first
  2. Platform: Choose from Platform SOPs
  3. Document: Use Collection Log and Entity Dossier
  4. Learn: Study Case Studies and Student Exercises

For Security Analysts

  1. Start here: Pentesting Index or Malware Analysis SOP
  2. Evidence integrity: Hash Generation
  3. Specialized: Choose SOPs based on assessment scope

For Researchers

Browse Investigation Index and Case Studies for real-world applications.


🧭 Navigation Tips

  • Sidebar - Explore all sections hierarchically
  • Search (top right) - Find specific techniques or platforms
  • Index pages - Comprehensive navigation hubs:
  • Tags - Discover related content across sections

πŸŽ“ Learning Paths

6 specialized learning tracks - Choose based on your career goals

Path 1: Investigations Specialist

Timeline: 6 weeks

Path 2: Security Analyst

Timeline: 6 weeks

Path 3: Penetration Tester

Timeline: 6 weeks

Path 4: Bug Bounty Hunter

Timeline: 6 weeks

Path 5: CTF Competitor

Timeline: 6 weeks

Path 6: Digital Forensics Investigator

Timeline: 6 weeks


πŸš€ Quick Start

Prerequisites

  • Obsidian v1.0 or higher
  • Git (optional, for cloning)

Installation

# Clone the repository
git clone https://github.com/gl0bal01/intel-codex.git

# Open in Obsidian
# File β†’ Open Vault β†’ Select the cloned folder

First Steps

  1. Open the vault in Obsidian
  2. Review the Main Sections above to understand the structure
  3. Before any investigation, review Legal & Ethics SOP
  4. Choose a Learning Path based on your goals

Repository Structure

ObsidianVault/
β”œβ”€β”€ README.md                      # ← You are here (main navigation hub)
β”œβ”€β”€ Investigations/                # OSINT techniques & platform guides
β”‚   β”œβ”€β”€ Platforms/                # Platform-specific SOPs (Twitter, Telegram, Instagram, etc.)
β”‚   └── Techniques/               # Investigation methods (OPSEC, legal, image analysis, etc.)
β”œβ”€β”€ Security/                      # Malware analysis & pentesting
β”‚   β”œβ”€β”€ Analysis/                 # Malware, forensic, reverse engineering, cryptography
β”‚   └── Pentesting/               # Web, mobile, AD, vulnerability research
└── Cases/                        # Investigation management & examples
    β”œβ”€β”€ Case-Template/            # Blank case structure for new investigations
    └── 2025-001-Example-Investigation/  # Complete case example

✨ What Makes This Different

  • Copy-Paste Ready - All commands provided for Windows/Linux/macOS
  • Heavily Cross-Referenced - SOPs link to related procedures and workflows
  • Learning Paths Included - 6 structured 6-week learning tracks
  • Real Examples - Complete investigation case examples
  • Templates Included - Blank case structure for starting investigations
  • Legal/Ethical First - Every SOP includes legal boundaries and ethical considerations
  • Practical over theoretical - Every SOP is based on real-world operations
  • OPSEC by default - Operational security considerations in every procedure

Content Philosophy

Intel Codex follows these principles:

  • Practical over theoretical: Every SOP is based on real-world operations
  • Legal and ethical first: All techniques emphasize compliance and responsible use
  • OPSEC by default: Operational security considerations in every procedure
  • Living documentation: Regular updates based on field experience
  • Template-driven: Reusable templates for consistent documentation

Related Resources

Want to strengthen your OSINT fundamentals? Explore OSINT Foundations for deep dives into theory, sockpuppet tradecraft, and strategic intelligence frameworks.

Explore more from gl0bal01.com:

  • Cybersecurity – Core security concepts, defensive strategies, and best practices
  • Reverse Engineering – Tutorials on binary analysis, deobfuscation, and reverse engineering techniques
  • AI – Resources on artificial intelligence, machine learning, and applied automation
  • Cheatsheets – Concise reference materials and command quick guides

🀝 Contributing

Contributions welcome! See CONTRIBUTING.md for detailed guidelines on:

  • How to submit changes
  • File naming and folder structure conventions
  • Content requirements and style guide
  • Review process

Quick summary: Fork β†’ Create branch β†’ Make changes β†’ Update navigation β†’ Submit PR


βš–οΈ Legal & Ethics

IMPORTANT: This vault is for educational and authorized investigative purposes only.

  • Always review Legal & Ethics SOP before investigations
  • Respect privacy laws (GDPR, CCPA, local regulations)
  • Only investigate with proper authorization
  • Escalate sensitive crimes appropriately (see Escalation SOP)

Disclaimer: Users are responsible for compliance with applicable laws.


πŸ“„ License

Licensed under the MIT License. If you use or fork this vault, please provide attribution.


Built with Obsidian - A powerful knowledge base on top of plain text Markdown files.