This software is provided for authorized security testing and educational purposes only.
By downloading, installing, or using this software, you acknowledge and agree to the following:
You must have explicit, written authorization from the owner of any system, network, or application before using these tools against it. Authorized contexts include:
- Penetration testing engagements with a signed Statement of Work (SoW)
- Bug bounty programs, within the program's defined scope and rules
- Red team / purple team exercises with documented authorization
- Testing your own infrastructure that you own or administer
- Educational and research purposes in isolated lab environments
You must not use this software to:
- Access, test, or attack systems without explicit authorization
- Conduct denial-of-service (DoS/DDoS) attacks
- Exfiltrate, steal, or destroy data belonging to others
- Distribute malware, ransomware, or other malicious software
- Violate any applicable local, state, national, or international law
- Harass, stalk, or harm any individual or organization
- Compromise supply chains or shared infrastructure
Security testing inherently carries risk. You assume full responsibility for:
- Any damage caused by the use or misuse of this software
- Ensuring your testing stays within authorized scope
- Compliance with all applicable laws and regulations in your jurisdiction
- Any legal consequences arising from unauthorized use
This software is provided "AS IS", without warranty of any kind, express or implied. The authors and contributors:
- Make no guarantees about the accuracy, reliability, or completeness of the tools
- Are not responsible for any damage to systems, data loss, or service disruption
- Do not guarantee that the tools will find all vulnerabilities or produce correct results
In no event shall the authors, contributors, or copyright holders (orizon.one) be liable for any claim, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the software or the use or other dealings in the software.
This includes, but is not limited to:
- Direct, indirect, incidental, special, or consequential damages
- Loss of profits, data, or business opportunities
- Legal fees or penalties resulting from unauthorized use
- Damages to third-party systems or reputation
Users are solely responsible for ensuring compliance with:
- Computer Fraud and Abuse Act (CFAA) - United States
- Computer Misuse Act 1990 - United Kingdom
- Convention on Cybercrime (Budapest Convention) - International
- GDPR - European Union (regarding any personal data encountered during testing)
- NIS2 Directive - European Union
- Any other applicable cybersecurity and data protection legislation in your jurisdiction
If you discover vulnerabilities using these tools during authorized testing:
- Follow responsible disclosure practices
- Report findings only to the authorized parties
- Do not publicly disclose vulnerabilities without permission from the system owner
- Comply with the bug bounty program's disclosure policy, if applicable
You agree to indemnify, defend, and hold harmless the authors and contributors from any claims, liabilities, damages, losses, or expenses (including legal fees) arising from your use or misuse of this software.
If you do not agree with these terms, do not download, install, or use this software.
By using this software, you confirm that you have read, understood, and agree to this disclaimer in its entirety.