Hermes Codex
Advanced Cyber Intelligence & AI Security Research.
🔴 Critical Intelligence Pulse (CVE)
Section titled “🔴 Critical Intelligence Pulse (CVE)” CVE-2026-32201: SharePoint Spoofing Improper input validation in Microsoft SharePoint Server. Confirmed CISA KEV. CVSS 6.5
CVE-2009-0238: MS Excel RCE Memory corruption in Excel object handling. Exploited by Trojan.Mdropper.AC. CVSS 9.3
CVE-2020-9715: Adobe Acrobat UAF Critical Use-After-Free in EScript.api leading to RCE. Confirmed KEV. CVSS 7.8
CVE-2023-36424: vCenter Auth Bypass Critical authentication bypass in VMware vCenter Server (7.0/8.0). CVSS 9.8
🔍 Forensic Deep Dives (Latest Labs)
Section titled “🔍 Forensic Deep Dives (Latest Labs)” Shellbags Forensic Analysis Reconstruct user navigation history and folder access patterns.
Prefetch (.pf) Files Forensic Analysis Proving binary execution and building forensic timelines.
Amcache & RecentFileCache Forensic Analysis Extracting SHA1 hashes and identifying malicious binaries.
Shimcache (AppCompatCache) Forensic Analysis Comprehensive guide to Shimcache (AppCompatCache) in Windows forensics
🛠️ Operational Resources
Section titled “🛠️ Operational Resources” Incident Response Playbooks Access our step-by-step guides for ransomware and data breach response.
Threat Intel Matrix Deep dive into APT TTPs and attribution mapping.
🤖 AI Security & Adversarial Research
Section titled “🤖 AI Security & Adversarial Research” Indirect Prompt Injection Analysis How attackers hijack LLM sessions via poisoned web content.
RAG Poisoning RAG Poisoning and Knowledge Base Manipulation.