Skip to content

Latest commit

 

History

History
87 lines (57 loc) · 3.76 KB

File metadata and controls

87 lines (57 loc) · 3.76 KB

Legal Disclaimer

Terms of Use

This software is provided for authorized security testing and educational purposes only.

By downloading, installing, or using this software, you acknowledge and agree to the following:

1. Authorization Required

You must have explicit, written authorization from the owner of any system, network, or application before using these tools against it. Authorized contexts include:

  • Penetration testing engagements with a signed Statement of Work (SoW)
  • Bug bounty programs, within the program's defined scope and rules
  • Red team / purple team exercises with documented authorization
  • Testing your own infrastructure that you own or administer
  • Educational and research purposes in isolated lab environments

2. Prohibited Use

You must not use this software to:

  • Access, test, or attack systems without explicit authorization
  • Conduct denial-of-service (DoS/DDoS) attacks
  • Exfiltrate, steal, or destroy data belonging to others
  • Distribute malware, ransomware, or other malicious software
  • Violate any applicable local, state, national, or international law
  • Harass, stalk, or harm any individual or organization
  • Compromise supply chains or shared infrastructure

3. Assumption of Risk

Security testing inherently carries risk. You assume full responsibility for:

  • Any damage caused by the use or misuse of this software
  • Ensuring your testing stays within authorized scope
  • Compliance with all applicable laws and regulations in your jurisdiction
  • Any legal consequences arising from unauthorized use

4. No Warranty

This software is provided "AS IS", without warranty of any kind, express or implied. The authors and contributors:

  • Make no guarantees about the accuracy, reliability, or completeness of the tools
  • Are not responsible for any damage to systems, data loss, or service disruption
  • Do not guarantee that the tools will find all vulnerabilities or produce correct results

5. Limitation of Liability

In no event shall the authors, contributors, or copyright holders (orizon.one) be liable for any claim, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the software or the use or other dealings in the software.

This includes, but is not limited to:

  • Direct, indirect, incidental, special, or consequential damages
  • Loss of profits, data, or business opportunities
  • Legal fees or penalties resulting from unauthorized use
  • Damages to third-party systems or reputation

6. Compliance with Laws

Users are solely responsible for ensuring compliance with:

  • Computer Fraud and Abuse Act (CFAA) - United States
  • Computer Misuse Act 1990 - United Kingdom
  • Convention on Cybercrime (Budapest Convention) - International
  • GDPR - European Union (regarding any personal data encountered during testing)
  • NIS2 Directive - European Union
  • Any other applicable cybersecurity and data protection legislation in your jurisdiction

7. Reporting Vulnerabilities

If you discover vulnerabilities using these tools during authorized testing:

  • Follow responsible disclosure practices
  • Report findings only to the authorized parties
  • Do not publicly disclose vulnerabilities without permission from the system owner
  • Comply with the bug bounty program's disclosure policy, if applicable

8. Indemnification

You agree to indemnify, defend, and hold harmless the authors and contributors from any claims, liabilities, damages, losses, or expenses (including legal fees) arising from your use or misuse of this software.


If you do not agree with these terms, do not download, install, or use this software.

By using this software, you confirm that you have read, understood, and agree to this disclaimer in its entirety.