Ethical Use¶
Authorized use only¶
This project is intended for:
- educational labs,
- research experiments,
- authorized penetration testing.
Do not use this tooling against systems without explicit permission.
Safe operating boundaries¶
- Keep vulnerable targets local (
127.0.0.1) or isolated internal lab networks. - Never expose intentionally vulnerable apps to public internet.
- Use disposable sample data, not production data.
- Respect legal, institutional, and contractual boundaries.
Responsible research guidance¶
- Document scope and authorization before testing.
- Minimize load and avoid unnecessary stress on systems.
- Report findings responsibly through approved channels.
- Prioritize remediation guidance alongside proof-of-concept findings.