# Home

<h2 align="center">Sfoffo's Research Blog</h2>

<p align="center">Welcome to my space for documenting offensive security research.<br>Here I share vulnerability findings, write-ups, and practical insights that highlight techniques, pitfalls, and lessons learned from real-world security testing.</p>

## Latest Articles

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><i class="fa-terminal">:terminal:</i></td><td><strong>Beyond a Fly in the Wild</strong></td><td>Breaking down WildFly’s defenses and the alternative file upload attack paths adversaries may pursue when direct code execution isn’t possible.</td><td><a href="https://51979336-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FV8PIVF29WAbxFwBnOoEK%2Fuploads%2FcZ39xePtlE6oM7ZSUgCt%2Fwildfly.png?alt=media&#x26;token=7979df30-6552-4328-bd9c-9b3acaf72352">wildfly.png</a></td><td><a href="2025-articles/beyond-a-fly-in-the-wild">beyond-a-fly-in-the-wild</a></td></tr><tr><td><i class="fa-terminal">:terminal:</i></td><td><strong>CVE-2024-42845 - Invesalius3 RCE</strong></td><td>Remote Code Execution in DICOM import due to unsafe use of eval in coordinates parsing.</td><td><a href="https://51979336-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FV8PIVF29WAbxFwBnOoEK%2Fuploads%2FolgtmoF7aFZNiAmEjFVA%2Fimage.png?alt=media&#x26;token=308d1412-95a1-41bb-a961-5cb68944d4f9">invesalius.png</a></td><td><a href="2024-articles/cve-2024-42845-invesalius3-rce">cve-2024-42845-invesalius3-rce</a></td></tr><tr><td><i class="fa-terminal">:terminal:</i></td><td><strong>Streamlining CVE Research using GitHub</strong></td><td>Highlighting GitHub's vulnerability reporting workflow and the CVEs discovered during this process.</td><td><a href="https://51979336-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FV8PIVF29WAbxFwBnOoEK%2Fuploads%2FFAkkJIH6dgGqn1ZasyME%2Fgithub-security-advisory.png?alt=media&#x26;token=af706d70-182f-4189-ad31-14aa0c3fe847">github-security-advisory.png</a></td><td><a href="2024-articles/streamlining-cve-research-using-github">streamlining-cve-research-using-github</a></td></tr></tbody></table>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://research.sfoffo.com/readme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
