EMPEROR303v.1.0
ROOT::
0DAY
3XP
▶ TERMINAL
EMPEROR303@darkside
$ whoami
emperor303 · uid=0(root) gid=0(root)
$ ls -la ./exploits/
total 303
drwxr-xr-x 3 root root 4096 Mar 17 23:13 .
drwxr-xr-x 10 root root 4096 Mar 17 23:13 ..
-rw-r--r-- 1 root root 1337 Mar 17 23:13 zeroday_pwn.c
-rwx------ 1 root root 707 Mar 17 23:13 kernel_privEsc.py
$ cat emperor_303.sig
╔═══╗ ╔══╗ ╔═══╗ ╔═══╗ ╔╗ ╔═══╗ ╔═══╗
║╔═╗║ ║╔╗║ ║╔══╝ ║╔══╝ ║║ ║╔═╗║ ║╔═╗║
║╚═╝║ ║╚╝║ ║╚══╗ ║╚══╗ ║║ ║║ ║║ ║╚═╝║
$ .
emperor303 · uid=0(root) gid=0(root)
$ ls -la ./exploits/
total 303
drwxr-xr-x 3 root root 4096 Mar 17 23:13 .
drwxr-xr-x 10 root root 4096 Mar 17 23:13 ..
-rw-r--r-- 1 root root 1337 Mar 17 23:13 zeroday_pwn.c
-rwx------ 1 root root 707 Mar 17 23:13 kernel_privEsc.py
$ cat emperor_303.sig
╔═══╗ ╔══╗ ╔═══╗ ╔═══╗ ╔╗ ╔═══╗ ╔═══╗
║╔═╗║ ║╔╗║ ║╔══╝ ║╔══╝ ║║ ║╔═╗║ ║╔═╗║
║╚═╝║ ║╚╝║ ║╚══╗ ║╚══╗ ║║ ║║ ║║ ║╚═╝║
$ .
#303 //
✪ NULLCON 2025 SPEAKER
Low-level architect, firmware breaker, zero-day hunter.
Archangel of the dark terminal.
0x1F9
exploits private
> 303
CVE records
∞
kernel access
/dev/
null pointers
LIVE FEED: INTRUSION SEQUENCE
23:13:37
Scanning 10.10.0.0/24 — open ports: 22, 80, 443, 8080, 1337
23:14:03
EMPEROR303: deploying heap spray against port 1337 (custom shellcode)
23:14:58
MSF venom: linux/x64/shell_reverse_tcp generated (303 bytes)
23:15:22
[✔] Access granted. uid=0 gid=0 context=unconfined
23:16:00
/ # cat /etc/shadow | grep root (stand by...)
▶ connect
ssh root@emperor303.dark · fingerprint: 30:33:DE:AD:BE:EF:30:30:30:33
[EMPEROR303] — "root is just a state of mind" — #!/bin/sh · encrypted channel