<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
    <channel>
      <title>Le Codex</title>
      <link>https://lecodex.xyz</link>
      <description>Last 50 notes on Le Codex</description>
      <generator>Quartz -- quartz.jzhao.xyz</generator>
      <item>
    <title>Intel Codex</title>
    <link>https://lecodex.xyz/</link>
    <guid>https://lecodex.xyz/</guid>
    <description><![CDATA[ Comprehensive collection of OSINT investigation techniques, security procedures, and real-world case studies from the field. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>Platform Investigation SOPs</title>
    <link>https://lecodex.xyz/Investigations/Platforms/Platforms-Index</link>
    <guid>https://lecodex.xyz/Investigations/Platforms/Platforms-Index</guid>
    <description><![CDATA[ Comprehensive platform OSINT guides: Twitter, Instagram, LinkedIn, Telegram, TikTok, Reddit & Bluesky. Master social media intelligence techniques. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>README</title>
    <link>https://lecodex.xyz/Cases/2025-001-Example-Investigation/README</link>
    <guid>https://lecodex.xyz/Cases/2025-001-Example-Investigation/README</guid>
    <description><![CDATA[ Case 2025-001: Example Investigation ⚠️ IMPORTANT: This is a DUMMY CASE for demonstration purposes only. All data is fictional. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>OSINT Investigation Glossary</title>
    <link>https://lecodex.xyz/Cases/Glossary</link>
    <guid>https://lecodex.xyz/Cases/Glossary</guid>
    <description><![CDATA[ Complete OSINT terminology guide: 100+ terms from blockchain to WHOIS, platforms, legal concepts & acronyms. Essential reference for investigators. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>Investigation Cases</title>
    <link>https://lecodex.xyz/Cases/README</link>
    <guid>https://lecodex.xyz/Cases/README</guid>
    <description><![CDATA[ Complete OSINT investigation workflows: case templates, student exercises & examples. Learn evidence collection, profiling & reporting with hands-on practice. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>00-Case-Overview</title>
    <link>https://lecodex.xyz/Cases/2025-001-Example-Investigation/00-Case-Overview</link>
    <guid>https://lecodex.xyz/Cases/2025-001-Example-Investigation/00-Case-Overview</guid>
    <description><![CDATA[ Case 2025-001: Example OSINT Investigation Case Information Case Number: 2025-001 Case Name: Example Social Media Fraud Investigation Status: 🟢 Active (Example Case) Priority: Medium Date Opened: 2025-01-15 Lead Investigator: [Your Name] Classification: EXAMPLE / TRAINING Executive Summary This is ... ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>01-Subject-Profiles</title>
    <link>https://lecodex.xyz/Cases/2025-001-Example-Investigation/01-Subject-Profiles</link>
    <guid>https://lecodex.xyz/Cases/2025-001-Example-Investigation/01-Subject-Profiles</guid>
    <description><![CDATA[ Subject Profiles - Case 2025-001 Case: Example OSINT Investigation Date: 2025-01-15 Investigator: [Your Name] Primary Subject: “Alex Morgan” Identity Overview Known Aliases: Alex Morgan (primary persona) @crypto_scammer_example (Twitter/X) @crypto_alex_official (Telegram) @crypto.alex.trades (Instag... ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>02-Collection-Log</title>
    <link>https://lecodex.xyz/Cases/2025-001-Example-Investigation/02-Collection-Log</link>
    <guid>https://lecodex.xyz/Cases/2025-001-Example-Investigation/02-Collection-Log</guid>
    <description><![CDATA[ Evidence Collection Log - Case 2025-001 Case: Example OSINT Investigation Lead Investigator: [Your Name] Collection Period: 2025-01-10 to 2025-01-15 SOP Reference: sop-collection-log Collection Summary CategoryItemsStatusScreenshots23✅ CompleteWHOIS Records4✅ CompleteBlockchain Data8✅ CompleteSocial... ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>CTF Team Coordination Guide</title>
    <link>https://lecodex.xyz/CTF/CTF_Team_Coordination</link>
    <guid>https://lecodex.xyz/CTF/CTF_Team_Coordination</guid>
    <description><![CDATA[ Quick reference for CTF team coordination: roles, communication, tracking, time management & crisis protocols. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>Sample Forensics Challenge: Hidden Image Data</title>
    <link>https://lecodex.xyz/CTF/Writeups/Sample_Forensics_Steganography_Writeup</link>
    <guid>https://lecodex.xyz/CTF/Writeups/Sample_Forensics_Steganography_Writeup</guid>
    <description><![CDATA[ CTF writeup: LSB steganography & EXIF analysis. Extract hidden data from image pixels using Python, PIL & forensics tools for CTF forensics challenges. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>Sample Reverse Engineering Challenge: Simple Crackme</title>
    <link>https://lecodex.xyz/CTF/Writeups/Sample_RevEng_Crackme_Writeup</link>
    <guid>https://lecodex.xyz/CTF/Writeups/Sample_RevEng_Crackme_Writeup</guid>
    <description><![CDATA[ CTF writeup: Reverse engineer license validator with Ghidra. Extract validation algorithm, generate valid keys & master static analysis for CTF challenges. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>CTF Writeups Index</title>
    <link>https://lecodex.xyz/CTF/Writeups/Writeups-Index</link>
    <guid>https://lecodex.xyz/CTF/Writeups/Writeups-Index</guid>
    <description><![CDATA[ Collection of detailed CTF challenge writeups covering cryptography, web exploitation, forensics, and reverse engineering with step-by-step solutions. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>OSINT Investigation Workflow Guide</title>
    <link>https://lecodex.xyz/Cases/Investigation-Workflow</link>
    <guid>https://lecodex.xyz/Cases/Investigation-Workflow</guid>
    <description><![CDATA[ Complete OSINT investigation workflow from authorization to closure. Master evidence collection, analysis, reporting with checklists, timelines & best practices. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>CTF Cheat Sheets Collection</title>
    <link>https://lecodex.xyz/CTF/CTF_Cheat_Sheets</link>
    <guid>https://lecodex.xyz/CTF/CTF_Cheat_Sheets</guid>
    <description><![CDATA[ Quick CTF reference: SQL injection, XSS, crypto ciphers, binary exploitation, forensics & network analysis. Copy-paste commands for CTF competitions. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>CTF Essential Tools Setup Guide</title>
    <link>https://lecodex.xyz/CTF/CTF_Tools</link>
    <guid>https://lecodex.xyz/CTF/CTF_Tools</guid>
    <description><![CDATA[ Complete CTF tools setup: Kali Linux, Burp Suite, Ghidra, Wireshark, pwntools & more. Installation scripts for web, crypto, binary & forensics tools. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>Sample Crypto Challenge: Caesar Cipher with Twist</title>
    <link>https://lecodex.xyz/CTF/Writeups/Sample_Crypto_Caesar_Writeup</link>
    <guid>https://lecodex.xyz/CTF/Writeups/Sample_Crypto_Caesar_Writeup</guid>
    <description><![CDATA[ CTF writeup: Variable Caesar cipher with incremental shifts per word. Learn pattern recognition, frequency analysis & systematic crypto challenge solving. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>Sample Web Challenge: SQL Injection Basic</title>
    <link>https://lecodex.xyz/CTF/Writeups/Sample_Web_SQLi_Writeup</link>
    <guid>https://lecodex.xyz/CTF/Writeups/Sample_Web_SQLi_Writeup</guid>
    <description><![CDATA[ CTF writeup: Bypass authentication with SQL injection using admin'-- payload. Learn web exploitation basics, injection testing & OWASP security concepts. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>CTF Getting Started Guide</title>
    <link>https://lecodex.xyz/CTF/CTF-Index</link>
    <guid>https://lecodex.xyz/CTF/CTF-Index</guid>
    <description><![CDATA[ Beginner's guide to Capture The Flag competitions: categories, tools, practice platforms & essential skills. Start your cybersecurity CTF journey today. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>CTF Challenge Methodology Guide</title>
    <link>https://lecodex.xyz/CTF/CTF_Challenge_Methodology</link>
    <guid>https://lecodex.xyz/CTF/CTF_Challenge_Methodology</guid>
    <description><![CDATA[ Master CTF challenges with systematic RICE framework: reconnaissance, investigation, strategy & execution. Covers web, crypto, binary, forensics & more. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>Security Index</title>
    <link>https://lecodex.xyz/Security/Security-Index</link>
    <guid>https://lecodex.xyz/Security/Security-Index</guid>
    <description><![CDATA[ Navigate malware analysis, penetration testing, vulnerability research, forensics & defensive security operations. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>Pentesting SOPs</title>
    <link>https://lecodex.xyz/Security/Pentesting/Pentesting-Index</link>
    <guid>https://lecodex.xyz/Security/Pentesting/Pentesting-Index</guid>
    <description><![CDATA[ Master offensive security: penetration testing SOPs covering web apps, AD, mobile, Linux, forensics, bug bounty & detection evasion techniques. ]]></description>
    <pubDate>Thu, 21 May 2026 20:17:54 GMT</pubDate>
  </item><item>
    <title>Discord SOP</title>
    <link>https://lecodex.xyz/Investigations/Platforms/sop-platform-discord</link>
    <guid>https://lecodex.xyz/Investigations/Platforms/sop-platform-discord</guid>
    <description><![CDATA[ Discord investigation guide: server enumeration, snowflake timestamp extraction, bot/webhook discovery, lurking discipline, and ToS-aware evidence collection for OSINT analysts. ]]></description>
    <pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Telegram SOP</title>
    <link>https://lecodex.xyz/Investigations/Platforms/sop-platform-telegram</link>
    <guid>https://lecodex.xyz/Investigations/Platforms/sop-platform-telegram</guid>
    <description><![CDATA[ Telegram investigation guide: channel monitoring, group analysis, bot tracking & encrypted messaging patterns for secure communication intelligence. ]]></description>
    <pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Financial Crime &amp; AML OSINT</title>
    <link>https://lecodex.xyz/Investigations/Techniques/sop-financial-aml-osint</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/sop-financial-aml-osint</guid>
    <description><![CDATA[ Financial intelligence techniques: cryptocurrency tracing, sanctions screening, AML investigation & blockchain analysis for financial crime detection. ]]></description>
    <pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Reporting, Packaging &amp; Disclosure</title>
    <link>https://lecodex.xyz/Investigations/Techniques/sop-reporting-packaging-disclosure</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/sop-reporting-packaging-disclosure</guid>
    <description><![CDATA[ Professional OSINT reporting: executive summaries, evidence packaging, chain of custody, law enforcement disclosure & responsible reporting protocols. ]]></description>
    <pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Security Analysis SOPs</title>
    <link>https://lecodex.xyz/Security/Analysis/Analysis-Index</link>
    <guid>https://lecodex.xyz/Security/Analysis/Analysis-Index</guid>
    <description><![CDATA[ Expert security analysis techniques: malware investigation, reverse engineering, cryptography audits, hash verification, smart-contract audit, cloud forensics, SaaS log forensics, email & BEC forensics & threat intelligence research. ]]></description>
    <pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Cloud Forensics SOP</title>
    <link>https://lecodex.xyz/Security/Analysis/sop-cloud-forensics</link>
    <guid>https://lecodex.xyz/Security/Analysis/sop-cloud-forensics</guid>
    <description><![CDATA[ IaaS-plane forensics methodology: AWS CloudTrail / Azure Monitor + Sentinel / GCP Audit Logs collection, IAM principal-action reconstruction, region-sweep, log-tampering detection, container-runtime artifacts (EKS / AKS / GKE), cloud-volume snapshot preservation with hash-chain integrity, and cross-cloud correlation. ]]></description>
    <pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Email &amp; BEC Forensics SOP</title>
    <link>https://lecodex.xyz/Security/Analysis/sop-email-bec-forensics</link>
    <guid>https://lecodex.xyz/Security/Analysis/sop-email-bec-forensics</guid>
    <description><![CDATA[ Scenario-centric Business Email Compromise forensics: email header forensics (Received-chain reconstruction, Authentication-Results parsing), SPF / DKIM / DMARC / ARC mechanics, lookalike-domain and brand-impersonation detection (IDN homograph, typosquatting, dnstwist patterns, CT-log monitoring), Microsoft 365 Get-MessageTrace and Google Workspace Email Log Search, secure-email-gateway forensics (Mimecast / Proofpoint / Barracuda envelope-vs-header), phishing-kit static analysis (defensive — kit acquisition, telltale strings, AiTM detection), wire-recall pathway (SWIFT MT103 / Fedwire / SEPA recall mechanics, Financial Fraud Kill Chain, FBI IC3 reporting, FinCEN SAR triggers, beneficiary-bank coordination), and BEC scenario taxonomy (CEO fraud, vendor-invoice fraud, payroll-redirect, attorney-impersonation, real-estate / closing-funds, gift-card scam). ]]></description>
    <pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Malware Analysis SOP</title>
    <link>https://lecodex.xyz/Security/Analysis/sop-malware-analysis</link>
    <guid>https://lecodex.xyz/Security/Analysis/sop-malware-analysis</guid>
    <description><![CDATA[ Complete malware analysis guide: static/dynamic analysis, sandbox setup, IOC extraction, YARA rules & threat intelligence for malware investigation. ]]></description>
    <pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>SaaS Log Forensics SOP</title>
    <link>https://lecodex.xyz/Security/Analysis/sop-saas-log-forensics</link>
    <guid>https://lecodex.xyz/Security/Analysis/sop-saas-log-forensics</guid>
    <description><![CDATA[ SaaS-tenant identity and collaboration plane forensics: Microsoft 365 Unified Audit Log + Purview eDiscovery, Google Workspace Admin SDK Reports + Vault, Okta System Log + Identity Threat Protection, Slack Audit Logs + Discovery API, Salesforce Setup Audit Trail + Real-Time Event Monitoring, GitHub / GitLab audit logs, OAuth consent-grant abuse reconstruction, cross-tenant collaboration forensics (Slack Connect / Workspace external sharing / Entra ID B2B), inbox-rule and mailbox-audit forensics, retention-cliff and discovery-export discipline. ]]></description>
    <pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Cloud Pentesting SOP (Authorized)</title>
    <link>https://lecodex.xyz/Security/Pentesting/sop-cloud-pentest</link>
    <guid>https://lecodex.xyz/Security/Pentesting/sop-cloud-pentest</guid>
    <description><![CDATA[ Master cloud penetration testing across AWS, Azure, and GCP: identity-plane enumeration, privilege escalation, storage exposure, metadata abuse, and managed k8s control-plane review. ]]></description>
    <pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Container &amp; Kubernetes Pentesting SOP (Authorized)</title>
    <link>https://lecodex.xyz/Security/Pentesting/sop-container-k8s-pentest</link>
    <guid>https://lecodex.xyz/Security/Pentesting/sop-container-k8s-pentest</guid>
    <description><![CDATA[ Master container and Kubernetes penetration testing: cluster recon, RBAC abuse, pod escape primitives, admission-controller bypass, workload-identity-to-cloud bridge, image / supply-chain attack surface, and detection coverage. ]]></description>
    <pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>OSINT Investigation Techniques</title>
    <link>https://lecodex.xyz/Investigations/Techniques/Techniques-Index</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/Techniques-Index</guid>
    <description><![CDATA[ Advanced OSINT methods: social media intelligence, domain reconnaissance, geolocation, people search & comprehensive open-source investigation tactics. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Blockchain Investigation</title>
    <link>https://lecodex.xyz/Investigations/Techniques/sop-blockchain-investigation</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/sop-blockchain-investigation</guid>
    <description><![CDATA[ Multi-chain crypto-asset tracing methodology: address clustering, bridge read-flow tracing, sanctions integration, commercial and open-source analytics, and court-admissibility tradecraft for OSINT and investigative work. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>OSINT Collection Log &amp; Chain of Custody</title>
    <link>https://lecodex.xyz/Investigations/Techniques/sop-collection-log</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/sop-collection-log</guid>
    <description><![CDATA[ Evidence documentation guide: SHA-256 hashing, chain of custody, metadata preservation & forensically sound collection for legal admissibility. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Darkweb Investigation</title>
    <link>https://lecodex.xyz/Investigations/Techniques/sop-darkweb-investigation</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/sop-darkweb-investigation</guid>
    <description><![CDATA[ Darkweb OSINT methodology: Tor and I2P navigation, hidden-service discovery, marketplace observation, vendor PGP pivots, and ransomware leak-site tracking — open-source observation only. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Entity Dossier Guide</title>
    <link>https://lecodex.xyz/Investigations/Techniques/sop-entity-dossier</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/sop-entity-dossier</guid>
    <description><![CDATA[ Build comprehensive subject profiles: identity verification, digital footprint mapping, relationship analysis & intelligence dossier templates for OSINT. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Legal, Ethics &amp; Data Governance for OSINT</title>
    <link>https://lecodex.xyz/Investigations/Techniques/sop-legal-ethics</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/sop-legal-ethics</guid>
    <description><![CDATA[ Essential legal & ethical boundaries for OSINT: GDPR/CPRA/state-privacy compliance, authorization, cross-border transfer, sensitive-data handling & responsible disclosure. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Mixer &amp; Privacy-Pool Tracing</title>
    <link>https://lecodex.xyz/Investigations/Techniques/sop-mixer-tracing</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/sop-mixer-tracing</guid>
    <description><![CDATA[ Mixer, CoinJoin, and privacy-pool de-obfuscation methodology: Tornado Cash on-chain heuristics, CoinJoin clustering attacks, cross-chain bridge laundering defeat, Monero / Zcash traceability research limits, and the regulatory event timeline for sanctions and prosecution work. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>OPSEC Planning for OSINT Investigations</title>
    <link>https://lecodex.xyz/Investigations/Techniques/sop-opsec-plan</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/sop-opsec-plan</guid>
    <description><![CDATA[ Protect yourself during investigations: VPN setup, burner accounts, browser isolation & operational security best practices for safe OSINT work. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Sensitive Crime Intake &amp; Escalation</title>
    <link>https://lecodex.xyz/Investigations/Techniques/sop-sensitive-crime-intake-escalation</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/sop-sensitive-crime-intake-escalation</guid>
    <description><![CDATA[ Critical incident protocols: CSAM reporting, violent threats, terrorism escalation & law enforcement referral procedures for sensitive investigations. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>AI/ML Vulnerability &amp; Evasion Testing SOP</title>
    <link>https://lecodex.xyz/Security/Analysis/sop-ai-vulnerability-evasion</link>
    <guid>https://lecodex.xyz/Security/Analysis/sop-ai-vulnerability-evasion</guid>
    <description><![CDATA[ Complete AI security testing: adversarial attacks, prompt injection, model extraction, LLM vulnerabilities & governance framework for red/blue teams. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Hash Generation Methods for Evidence Integrity</title>
    <link>https://lecodex.xyz/Security/Analysis/sop-hash-generation-methods</link>
    <guid>https://lecodex.xyz/Security/Analysis/sop-hash-generation-methods</guid>
    <description><![CDATA[ Forensic hashing guide: SHA-256, SHA-3, BLAKE2/3, MD5/SHA-1 deprecation, file integrity verification, chain of custody & cryptographic hashing for digital evidence preservation. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Smart Contract Audit SOP</title>
    <link>https://lecodex.xyz/Security/Analysis/sop-smart-contract-audit</link>
    <guid>https://lecodex.xyz/Security/Analysis/sop-smart-contract-audit</guid>
    <description><![CDATA[ Smart contract audit lifecycle: threat modeling, defect taxonomy (SWC), vulnerability classes (reentrancy / oracle / MEV / upgrade / governance), tooling (Slither / Echidna / Foundry / Halmos), formal verification (Certora / SMTChecker / K), audit-report structure, remediation verification, and multi-chain coverage. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Active Directory Pentesting SOP (Authorized)</title>
    <link>https://lecodex.xyz/Security/Pentesting/sop-ad-pentest</link>
    <guid>https://lecodex.xyz/Security/Pentesting/sop-ad-pentest</guid>
    <description><![CDATA[ Master Active Directory penetration testing: enumeration, Kerberoasting, password spraying, privilege escalation, Golden Tickets & domain takeover. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Firmware Reverse Engineering</title>
    <link>https://lecodex.xyz/Security/Pentesting/sop-firmware-reverse-engineering</link>
    <guid>https://lecodex.xyz/Security/Pentesting/sop-firmware-reverse-engineering</guid>
    <description><![CDATA[ Extract & analyze firmware: binary extraction, filesystem analysis, vulnerability hunting in IoT devices. Tools: Binwalk, unblob, Ghidra, QEMU emulation. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Mobile Security (iOS &amp; Android)</title>
    <link>https://lecodex.xyz/Security/Pentesting/sop-mobile-security</link>
    <guid>https://lecodex.xyz/Security/Pentesting/sop-mobile-security</guid>
    <description><![CDATA[ Comprehensive mobile app testing: iOS/Android reverse engineering, runtime analysis, SSL pinning bypass & vulnerability exploitation techniques. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Wireless &amp; RF Pentesting (Authorized)</title>
    <link>https://lecodex.xyz/Security/Pentesting/sop-wireless-rf-pentest</link>
    <guid>https://lecodex.xyz/Security/Pentesting/sop-wireless-rf-pentest</guid>
    <description><![CDATA[ Authorized wireless and software-defined-radio testing across Wi-Fi (WPA2/WPA3/OWE), Bluetooth Classic/BLE, 802.15.4 (Zigbee/Thread/Matter), LoRa/LoRaWAN, NFC/RFID, and sub-GHz with HackRF / RTL-SDR / LimeSDR. ]]></description>
    <pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Image &amp; Video OSINT</title>
    <link>https://lecodex.xyz/Investigations/Techniques/sop-image-video-osint</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/sop-image-video-osint</guid>
    <description><![CDATA[ Visual intelligence techniques: EXIF analysis, reverse image search, geolocation, video verification & deepfake detection for media investigations. ]]></description>
    <pubDate>Sat, 25 Apr 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Web, DNS &amp; WHOIS OSINT</title>
    <link>https://lecodex.xyz/Investigations/Techniques/sop-web-dns-whois-osint</link>
    <guid>https://lecodex.xyz/Investigations/Techniques/sop-web-dns-whois-osint</guid>
    <description><![CDATA[ Domain intelligence techniques: WHOIS/RDAP lookups, DNS records, certificate transparency, subdomain enumeration, passive DNS & infrastructure mapping for web investigations. ]]></description>
    <pubDate>Sat, 25 Apr 2026 00:00:00 GMT</pubDate>
  </item>
    </channel>
  </rss>