You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: LICENSE.md
+5-28Lines changed: 5 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,33 +20,10 @@ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
20
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
21
SOFTWARE.
22
22
23
-
## Additional Ethical Usage Terms
23
+
## Ethical Usage Clause
24
24
25
-
### Security Tool Usage Restrictions
26
-
While this software is licensed under MIT, users must comply with:
27
-
1. All applicable laws and regulations
28
-
2. Ethical hacking principles
29
-
3. Required permissions and authorizations
30
-
4. Responsible disclosure practices
25
+
This software is intended for authorized security testing, educational purposes,
26
+
and legitimate cybersecurity research only. Users are solely responsible for
27
+
ensuring their usage complies with all applicable laws and regulations.
31
28
32
-
### Liability Notice
33
-
The developers are not liable for:
34
-
- Misuse of these security tools
35
-
- Legal consequences of unauthorized usage
36
-
- Damages resulting from tool usage
37
-
- Security incidents caused by users
38
-
39
-
### Enforcement
40
-
Violation of ethical usage terms may result in:
41
-
- Revocation of usage rights
42
-
- Legal action in applicable jurisdictions
43
-
- Reporting to appropriate authorities
44
-
45
-
## Third-Party Tools
46
-
This toolkit includes wrappers for third-party tools. Each tool maintains its own license and terms of use. Users are responsible for complying with individual tool licenses.
47
-
48
-
## Attribution
49
-
When using this software, please consider:
50
-
- Giving credit to 516 Hackers
51
-
- Promoting ethical security practices
52
-
- Contributing back to the community
29
+
Unauthorized use of this software for malicious activities is strictly prohibited.
0 commit comments