
ZYPHERON
End User License Agreement
Last Updated: January 2025
1. Authorized Testing Only
ZYPHERON's security tools may only be used on systems where you have explicit authorization:
- Your own systems: Systems you own, operate, or manage
- Contracted testing: Systems where you have a signed penetration testing agreement
- Bug bounty programs: Systems with published bug bounty programs that permit testing
- Educational environments: Dedicated lab environments designed for security testing
⚠️ NEVER use these tools against systems you do not own or lack explicit permission to test. This may constitute illegal activity under computer crime laws.
2. Security Tool Guidelines
Penetration Testing:
- •Always obtain written authorization before conducting penetration tests
- •Define clear scope and limitations for testing activities
- •Avoid causing disruption or damage to target systems
- •Report findings responsibly to system owners
- •Do not access, modify, or exfiltrate sensitive data unnecessarily
Vulnerability Scanning:
- •Limit scan intensity to avoid system overload
- •Schedule scans during appropriate maintenance windows
- •Respect rate limits and system capacity
- •Document and report discovered vulnerabilities appropriately
OSINT Gathering:
- •Use only publicly available information sources
- •Respect website terms of service and robots.txt
- •Avoid overwhelming servers with excessive requests
- •Protect personal privacy of individuals in gathered data
3. Prohibited Activities
Illegal Activities:
- ✗Unauthorized access to computer systems
- ✗Data theft or exfiltration
- ✗System disruption or denial of service
- ✗Malware distribution
- ✗Identity theft or fraud
- ✗Violation of computer crime laws
Unethical Activities:
- ✗Testing without proper authorization
- ✗Exceeding agreed-upon testing scope
- ✗Causing unnecessary system damage
- ✗Accessing personal or sensitive data
- ✗Selling or sharing discovered vulnerabilities
- ✗Using findings for competitive advantage
4. Professional Standards
When using ZYPHERON for professional security testing:
- Documentation: Maintain detailed records of testing activities and findings
- Communication: Keep stakeholders informed of testing progress and discoveries
- Confidentiality: Protect client information and testing results
- Remediation: Provide actionable recommendations for vulnerability fixes
- Follow-up: Verify that reported issues have been properly addressed
Best Practice: Follow established frameworks like OWASP, NIST, or PTES for structured and comprehensive security assessments.
5. Legal Compliance
Users must comply with all applicable laws and regulations, including:
United States:
- •Computer Fraud and Abuse Act (CFAA)
- •Digital Millennium Copyright Act (DMCA)
- •State computer crime laws
- •Industry-specific regulations (HIPAA, SOX, etc.)
International:
- •General Data Protection Regulation (GDPR)
- •Computer Misuse Act (UK)
- •Local cybercrime legislation
- •Cross-border data protection laws
6. Subscription Tiers and Usage Limits
Light Tier
- • 100K total AI tokens/month
- • Basic security tools
- • Standard rate limits
- • Community support
Pro Tier
- • 1M total AI tokens/month
- • Advanced security tools
- • Higher rate limits
- • Priority support
- • Custom configurations
Enterprise Tier
- • Unlimited AI tokens
- • All security tools
- • No rate limits
- • Dedicated support
- • Custom integrations
- • On-premise options
7. Responsible Disclosure
When discovering vulnerabilities using ZYPHERON tools:
- Report vulnerabilities directly to the affected organization
- Provide reasonable time for remediation before public disclosure
- Do not publicly disclose vulnerabilities without proper coordination
- Avoid accessing or demonstrating impact on sensitive data
- Work collaboratively with security teams to resolve issues
- Respect bug bounty program rules and timelines
8. Educational Use
ZYPHERON welcomes educational use for learning cybersecurity concepts:
- •Use only on dedicated lab environments or your own systems
- •Respect institutional policies and guidelines
- •Focus on understanding security concepts and methodologies
- •Share knowledge responsibly within academic communities
Students and Educators: Contact us for educational discounts and specialized training resources for cybersecurity education.
9. Contact Information
Creator: Harrison McCall
Service: ZYPHERON
Website: https://zypheron.net
Email: Harrison@zypheron.com
Support: Available through the platform