EMPEROR303v.1.0
ROOT::
0DAY
3XP
▶ TERMINAL EMPEROR303@darkside
$ whoami
emperor303 · uid=0(root) gid=0(root)
$ ls -la ./exploits/
total 303
drwxr-xr-x 3 root root 4096 Mar 17 23:13 .
drwxr-xr-x 10 root root 4096 Mar 17 23:13 ..
-rw-r--r-- 1 root root 1337 Mar 17 23:13 zeroday_pwn.c
-rwx------ 1 root root 707 Mar 17 23:13 kernel_privEsc.py
$ cat emperor_303.sig
╔═══╗ ╔══╗ ╔═══╗ ╔═══╗ ╔╗ ╔═══╗ ╔═══╗
║╔═╗║ ║╔╗║ ║╔══╝ ║╔══╝ ║║ ║╔═╗║ ║╔═╗║
║╚═╝║ ║╚╝║ ║╚══╗ ║╚══╗ ║║ ║║ ║║ ║╚═╝║
$ .

#303 //

✪ NULLCON 2025 SPEAKER

Low-level architect, firmware breaker, zero-day hunter.
Archangel of the dark terminal.

C ASM py ARM ROP HEAP WIFI SEI
0x1F9
exploits private
> 303
CVE records
kernel access
/dev/
null pointers
LIVE FEED: INTRUSION SEQUENCE
23:13:37 Scanning 10.10.0.0/24 — open ports: 22, 80, 443, 8080, 1337
23:14:03 EMPEROR303: deploying heap spray against port 1337 (custom shellcode)
23:14:58 MSF venom: linux/x64/shell_reverse_tcp generated (303 bytes)
23:15:22 [✔] Access granted. uid=0 gid=0 context=unconfined
23:16:00 / # cat /etc/shadow | grep root (stand by...)
▶ connect
ssh root@emperor303.dark · fingerprint: 30:33:DE:AD:BE:EF:30:30:30:33
[EMPEROR303] — "root is just a state of mind" — #!/bin/sh · encrypted channel
hidden emperor