Skip to content

Ethical Use

Authorized use only

This project is intended for:

  • educational labs,
  • research experiments,
  • authorized penetration testing.

Do not use this tooling against systems without explicit permission.

Safe operating boundaries

  • Keep vulnerable targets local (127.0.0.1) or isolated internal lab networks.
  • Never expose intentionally vulnerable apps to public internet.
  • Use disposable sample data, not production data.
  • Respect legal, institutional, and contractual boundaries.

Responsible research guidance

  • Document scope and authorization before testing.
  • Minimize load and avoid unnecessary stress on systems.
  • Report findings responsibly through approved channels.
  • Prioritize remediation guidance alongside proof-of-concept findings.