Alibrown commited on
Commit
9c221aa
·
verified ·
1 Parent(s): cc21315

Create ESOL

Browse files
Files changed (1) hide show
  1. ESOL +88 -0
ESOL ADDED
@@ -0,0 +1,88 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ## Ethical Security Operations License (ESOL v1.1)
2
+
3
+ ### Section 1: Preamble and Scope
4
+ The **Ethical Security Operations License (ESOL v1.1)** is an **additional, non-severable condition** supplementing the **MIT License** under which the covered software (hereinafter "the Work") is distributed.
5
+
6
+ By downloading, copying, modifying, or executing the Work, the Licensee **irrevocably agrees** to adhere to both the terms of the MIT License and the specific, mandatory ethical constraints defined herein. **Lack of awareness of these terms does not constitute a defense.**
7
+
8
+ ### Section 2: Mandatory Ethical Use and Purpose
9
+ The grant of rights under this License is **expressly and exclusively conditioned** upon the Licensee's continuous adherence to the following use limitations:
10
+
11
+ 1. **Authorized Use Only:** The Work shall be used **exclusively** for:
12
+ - Defensive security operations (Blue Teaming)
13
+ - Authorized penetration testing (Red Teaming) with documented consent
14
+ - Vulnerability research on systems owned or explicitly authorized by the researcher
15
+ - Security compliance auditing with contractual authorization
16
+
17
+ 2. **Explicit Written Authorization Required:** Any security testing, scanning, exploitation, or enumeration against **any system not wholly owned by the Licensee** requires **explicit, documented, written authorization** from the rightful owner **prior to execution**. Verbal permission, implicit consent, or "bug bounty program existence" does **not** constitute authorization without explicit scope documentation.
18
+
19
+ 3. **Educational Use Constraints:** Educational or research use must:
20
+ - Occur only in isolated, controlled environments (virtual machines, dedicated test networks)
21
+ - Not target production systems, public infrastructure, or third-party services
22
+ - Comply with institutional ethics board requirements where applicable
23
+
24
+ ### Section 3: Prohibited Use (Malicious Activities)
25
+ The Licensee is **strictly and unconditionally prohibited** from using the Work for:
26
+
27
+ * **Unauthorized Access or Reconnaissance:** Scanning, probing, accessing, or attempting to access any computer system, network, database, or data without **explicit prior written authorization** from the lawful owner.
28
+
29
+ * **Malicious Code Operations:** Creating, distributing, executing, or facilitating:
30
+ - Malware, viruses, worms, trojans, ransomware, or rootkits
31
+ - Cryptominers operating without system owner consent
32
+ - Phishing infrastructure, scam campaigns, or social engineering attacks
33
+ - Exploits targeting zero-day vulnerabilities outside authorized disclosure processes
34
+
35
+ * **Service Disruption:** Denial-of-service (DoS/DDoS) attacks, resource exhaustion, or any unauthorized degradation of system availability or performance.
36
+
37
+ * **Data Exfiltration or Manipulation:** Unauthorized copying, modification, deletion, or encryption of data not owned by the Licensee.
38
+
39
+ * **Legal Violations:** Any activity violating the Computer Fraud and Abuse Act (CFAA), GDPR, national cybercrime laws, or international treaties concerning unauthorized computer access.
40
+
41
+ * **Circumvention of Security Controls:** Bypassing authentication, encryption, access controls, or security monitoring systems without documented authorization.
42
+
43
+ ### Section 4: Compliance Verification and Audit Rights
44
+ The Licensor reserves the right to:
45
+ - Request documentation of authorization for any deployment of the Work
46
+ - Audit compliance upon reasonable notice if misuse is suspected
47
+ - Publicly disclose violations (including Licensee identity) to warn the security community
48
+
49
+ **Licensees conducting authorized security research are encouraged to maintain contemporaneous records of authorization as evidence of compliance.**
50
+
51
+ ### Section 5: No Warranty Regarding Legal Compliance
52
+ **THE WORK IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. THE LICENSOR MAKES NO REPRESENTATION THAT USE OF THE WORK, EVEN IN COMPLIANCE WITH THIS LICENSE, WILL BE LEGAL IN ALL JURISDICTIONS. THE LICENSEE BEARS SOLE RESPONSIBILITY FOR ENSURING COMPLIANCE WITH ALL APPLICABLE LAWS.**
53
+
54
+ ### Section 6: Violation and Termination
55
+ Violation of **any** provision of this ESOL v1.1 constitutes a **material breach** resulting in:
56
+
57
+ 1. **Immediate Automatic Termination** of all rights under both the MIT License and this ESOL
58
+ 2. **Obligation to Cease Use** and destroy all copies of the Work
59
+ 3. **Liability for Damages:** The Licensee shall be liable for all damages, including but not limited to:
60
+ - Direct and consequential damages to affected third parties
61
+ - Licensor's legal costs in enforcement actions
62
+ - Reputational harm to the Licensor or the security research community
63
+
64
+ 4. **Reporting to Authorities:** The Licensor reserves the right to report violations to appropriate law enforcement and cybersecurity authorities.
65
+
66
+ ### Section 7: Severability and Precedence
67
+ If any provision of this License is held unenforceable, the remaining provisions remain in full effect. **In any conflict between the MIT License and ESOL v1.1, the ESOL v1.1 takes precedence regarding ethical use constraints.**
68
+
69
+ ### Section 8: Jurisdiction and Dispute Resolution
70
+ This License shall be governed by the laws of **[Germany(Berlin)]**. Disputes shall be resolved through binding arbitration under **[Arbitration Rules]**, with the prevailing party entitled to attorney's fees.
71
+
72
+ ### Section 9: License Acceptance Evidence
73
+ By downloading this software from any source (GitHub, mirrors, forks), you acknowledge that:
74
+ - This license was prominently displayed in the repository
75
+ - You had reasonable opportunity to review these terms
76
+ - Your use constitutes legally binding acceptance
77
+ ---
78
+
79
+ ## Final Licensing Statement
80
+ **This Work is dual-licensed under:**
81
+ 1. **The MIT License** (for general software rights)
82
+ 2. **The Ethical Security Operations License v1.1 (ESOL v1.1)** (for use constraints)
83
+
84
+ **The ESOL v1.1 is a mandatory, non-severable condition of use. Acceptance is automatic upon use of the Work.**
85
+
86
+ **By using this software, you acknowledge that misuse may result in criminal prosecution, civil liability, and permanent termination of license rights.**
87
+
88
+ > Checked & Updated, on 05.02.2026 @04-31MEZ , Thanks Rita