forked from yashab-cyber/HackGpt
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathLICENSE
More file actions
202 lines (152 loc) · 8.01 KB
/
LICENSE
File metadata and controls
202 lines (152 loc) · 8.01 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
HackGPT Enterprise License
Copyright (c) 2025 HackGPT Enterprise Team
All rights reserved.
ENTERPRISE SOFTWARE LICENSE AGREEMENT
This Enterprise Software License Agreement ("Agreement") is a legal agreement
between you (either an individual or a single entity) and the HackGPT Enterprise
Team ("Licensor") for the HackGPT Enterprise AI-Powered Penetration Testing
Platform software ("Software").
BY INSTALLING, COPYING, OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO BE BOUND
BY THE TERMS OF THIS AGREEMENT.
1. GRANT OF LICENSE
Subject to the terms and conditions of this Agreement, Licensor hereby grants
you a non-exclusive, non-transferable license to use the Software for:
a) Authorized security testing and penetration testing activities
b) Enterprise security assessments and audits
c) Compliance testing and validation
d) Security research and education purposes
e) Commercial security consulting (with attribution)
2. PERMITTED USES
You may:
- Install and use the Software on multiple systems within your organization
- Modify the Software for internal use and customization
- Create derivative works for internal security testing purposes
- Distribute modified versions with proper attribution and compliance with this license
- Use the Software for commercial security consulting services
- Integrate the Software with existing enterprise security infrastructure
3. RESTRICTIONS
You may NOT:
- Use the Software against systems without explicit written authorization
- Use the Software for illegal, malicious, or unauthorized activities
- Remove or alter any copyright, trademark, or license notices
- Reverse engineer, decompile, or disassemble core proprietary algorithms
- Use the Software to violate any applicable laws or regulations
- Redistribute the Software without this license agreement
4. COMPLIANCE AND LEGAL REQUIREMENTS
Users MUST:
- Obtain proper written authorization before conducting any security assessments
- Comply with all applicable local, state, federal, and international laws
- Follow responsible disclosure practices for discovered vulnerabilities
- Maintain comprehensive audit logs and documentation
- Ensure compliance with relevant industry standards (OWASP, NIST, ISO27001, etc.)
- Respect intellectual property rights and privacy regulations
5. ENTERPRISE SUPPORT AND SERVICES
This license includes:
- Community support through public channels
- Access to documentation and user guides
- Software updates and security patches
- Bug fixes and maintenance releases
Premium enterprise support is available separately and may include:
- Priority technical support
- Professional services and implementation assistance
- Custom development and integration services
- Training and certification programs
- Service level agreements (SLA)
6. DATA PROTECTION AND PRIVACY
The Software:
- Processes security assessment data locally by default
- May integrate with third-party services (OpenAI, cloud providers) if configured
- Includes built-in data encryption and protection mechanisms
- Supports compliance with GDPR, CCPA, and other privacy regulations
- Maintains audit logs for compliance and forensic purposes
Users are responsible for:
- Configuring appropriate data protection settings
- Ensuring compliance with applicable privacy laws
- Securing credentials and sensitive assessment data
- Implementing proper access controls and user management
7. LIABILITY AND WARRANTIES
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
DAMAGES, OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT, OR
OTHERWISE, ARISING FROM, OUT OF, OR IN CONNECTION WITH THE SOFTWARE OR THE
USE OR OTHER DEALINGS IN THE SOFTWARE.
LIMITATION OF LIABILITY:
- Licensor's total liability shall not exceed the amount paid for enterprise support services
- Licensor is not liable for indirect, incidental, or consequential damages
- Users assume full responsibility for proper and lawful use of the Software
- This limitation applies even if Licensor has been advised of the possibility of such damages
8. INDEMNIFICATION
You agree to indemnify, defend, and hold harmless the Licensor from and against
any and all claims, damages, obligations, losses, liabilities, costs, or debt,
and expenses (including but not limited to attorney's fees) arising from:
- Your use of the Software
- Your violation of any term of this Agreement
- Your violation of any third-party rights, including privacy and intellectual property rights
- Any unauthorized or illegal use of the Software
9. INTELLECTUAL PROPERTY
The Software and its original features, functionality, and general appearance are
and will remain the exclusive property of the Licensor and its licensors. The
Software is protected by copyright, trademark, and other intellectual property laws.
You acknowledge that:
- No title to or ownership of the Software is transferred to you
- This license does not grant you any rights to trademarks or service marks
- Any feedback or contributions you provide may be used by Licensor without restriction
10. COMPLIANCE FRAMEWORKS
The Software is designed to support compliance with industry standards including:
- OWASP Testing Guide and Top 10
- NIST Cybersecurity Framework
- ISO 27001 Information Security Management
- SOC 2 Security and Availability
- PCI DSS Data Security Standard
- GDPR and other privacy regulations
Users are responsible for ensuring their use of the Software meets applicable
compliance requirements for their industry and jurisdiction.
11. EXPORT RESTRICTIONS
The Software may be subject to export restrictions. You agree to comply with all
applicable export and re-export control laws and regulations, including the U.S.
Export Administration Regulations and international export control regimes.
12. TERMINATION
This license is effective until terminated. Your rights under this license will
terminate automatically without notice if you fail to comply with any term(s)
of this Agreement. Upon termination, you must cease all use of the Software
and destroy all copies in your possession.
13. GOVERNING LAW
This Agreement shall be governed by and construed in accordance with the laws
of the jurisdiction where the Licensor is established, without regard to its
conflict of law provisions.
14. ENTIRE AGREEMENT
This Agreement constitutes the entire agreement between you and Licensor relating
to the Software and supersedes all prior or contemporaneous agreements, whether
oral or written, relating to the subject matter hereof.
15. SEVERABILITY
If any provision of this Agreement is held to be invalid or unenforceable, such
provision shall be struck and the remaining provisions shall be enforced to the
fullest extent under applicable law.
16. UPDATES AND MODIFICATIONS
Licensor reserves the right to update this license with new releases of the
Software. Continued use of updated Software constitutes acceptance of any
license modifications.
---
IMPORTANT LEGAL NOTICES:
SECURITY TESTING DISCLAIMER:
HackGPT Enterprise is designed exclusively for authorized security testing,
penetration testing, and security research purposes. Any use of this software
for unauthorized access to computer systems, networks, or data is strictly
prohibited and may violate applicable laws.
PROFESSIONAL USE:
This software is intended for use by qualified security professionals,
penetration testers, and authorized security researchers. Users should have
appropriate training and expertise in cybersecurity practices.
RESPONSIBLE DISCLOSURE:
Users are expected to follow responsible disclosure practices when discovering
vulnerabilities, including coordinating with affected parties and allowing
reasonable time for remediation before public disclosure.
CONTACT INFORMATION:
- General Inquiries: info@hackgpt.dev
- Enterprise Support: enterprise@hackgpt.dev
- Security Issues: security@hackgpt.dev
- Legal Matters: legal@hackgpt.dev
Last Updated: August 18, 2025
Version: 2.0.0 Enterprise Edition