Important Legal & Ethical Notice

This project, including all associated modules, scripts, and user interfaces, is provided strictly for legitimate security testing and educational purposes by authorized professionals. Unauthorized use may be illegal and could lead to criminal and civil penalties.

Phishing is illegal without explicit permission. You must have a written authorization (e.g., contract, letter of engagement, or signed scope) from the system owner before performing any testing.

Intended Audience

  • Red teamers and penetration testers working under a valid Statement of Work.
  • Blue teamers and defenders conducting adversary emulation in controlled environments.
  • Security researchers and educators in lab settings with consent.

You Agree To

  • Use this tool only with explicit, written authorization from asset owners.
  • Comply with all applicable laws and regulations in your jurisdiction.
  • Protect captured data and handle it according to your engagement’s confidentiality rules.
  • Avoid targeting uninvolved third parties or production environments without scope approval.

Data Handling

  • Minimize data collection to what is necessary for the engagement.
  • Store sensitive data securely and encrypt it at rest and in transit when possible.
  • Purge data promptly at the end of an engagement or per contractual obligations.

Disclaimer

The authors and contributors are not responsible for any misuse or damage caused by this software. Using this project implies that you understand and accept these terms and will use it responsibly and lawfully.