Necromancer Labs
11 posts

Necromancer Labs
@NecromancerLabs
Embedded systems security research lab. We create tools, frameworks, and techniques.
30A FL Katılım Mayıs 2025
7 Takip Edilen13 Takipçiler

LG WebOS TV Path Traversal, Authentication Bypass and Full Device Takeover #LGWebOSTV #PathTraversal #AuthenticationBypass #DeviceTakeover #Vulnerability ssd-disclosure.com/lg-webos-tv-pa…
English


Technical analysis of the TP-Link ER605 Pre-Auth RCE exploit chain by @yibarrack.
This writeup documents the reproduction of CVE-2024-5242, 5243, and 5244, detailing a 2-stage exploitation process to bypass ASLR on MIPS32 LE.
Full report: oobs.io/posts/er605-1d…
English

uart-push
Like scp, but for serial connections
Easily get binaries (like an embbridge agent) onto an embedded device, useful when ssh and telnet can’t be used but you can achieve UART
github.com/Necromancer-La…

English

embbridge - like adb, but edb
Check out our rad interactive adb-like device bridge for embedded systems.
Shell, file transfer, and firmware dumping for forensics and research. @badsectorlabs
github.com/Necromancer-La…

English

Introducing gocmd2 – an interactive shell framework for Go, inspired by python cmd2 by Todd Leonhardt.
- Interactive shell framework
- Built on Cobra
- Module support
- Tab completion
- History
- Shared state & more
CLI devs, you’ll love this.
🔗 github.com/Necromancerlab…

English

There are likely Ligolo servers on the Internet that you can connect to with a Ligolo agent.
1. Ligolo has 3 JARM signatures.
2. Ligolo-MP's JARM is the same as Sliver C2.
3. We do not advise or condone connecting to potential Ligolo servers. necromancerlabs.com/research/paper…

English