4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / LICENSE
TERMINUS - CVE-2026-24061 SCANNER & EXPLOITATION FRAMEWORK
RESTRICTED USE LICENSE

Copyright (c) 2026 Security Research Team

IMPORTANT: READ CAREFULLY BEFORE USING THIS SOFTWARE

This software and associated documentation files (the "Software") are provided 
under the following terms and conditions:

1. PERMITTED USE

   The Software is intended ONLY for:
   
   a) Authorized penetration testing engagements with explicit written permission
   b) Security research in isolated, controlled laboratory environments
   c) Defensive security assessments with proper authorization
   d) Educational purposes in authorized academic or training settings
   e) CTF (Capture The Flag) competitions and authorized security challenges
   f) Internal security audits by authorized personnel

2. PROHIBITED USE

   You are PROHIBITED from using this Software for:
   
   a) Unauthorized access to computer systems or networks
   b) Scanning or exploitation of systems without explicit written authorization
   c) Any activity that violates local, state, national, or international laws
   d) Malicious purposes including but not limited to:
      - Unauthorized data theft or exfiltration
      - Disruption of services or denial of service attacks
      - Installation of malware or backdoors
      - Any form of cyber attack or computer crime
   e) Commercial exploitation without proper licensing
   f) Distribution of modified versions without attribution

3. AUTHORIZATION REQUIREMENTS

   Before using this Software, you must:
   
   a) Obtain explicit written authorization from system owners
   b) Document the scope of authorized testing
   c) Comply with all applicable laws and regulations
   d) Follow responsible disclosure practices for discovered vulnerabilities
   e) Maintain audit logs of all scanning and exploitation activities

4. DISCLAIMER OF WARRANTY

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 
   IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 
   FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT.

   IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, 
   DAMAGES, OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT, OR 
   OTHERWISE, ARISING FROM, OUT OF, OR IN CONNECTION WITH THE SOFTWARE OR THE 
   USE OR OTHER DEALINGS IN THE SOFTWARE.

5. LIMITATION OF LIABILITY

   UNDER NO CIRCUMSTANCES SHALL THE AUTHORS, CONTRIBUTORS, OR COPYRIGHT HOLDERS 
   BE LIABLE FOR:
   
   a) Direct, indirect, incidental, special, or consequential damages
   b) Loss of data, revenue, or profits
   c) Legal consequences arising from unauthorized use
   d) Damage to systems or networks
   e) Any claims by third parties

6. USER RESPONSIBILITY

   By using this Software, you acknowledge and agree that:
   
   a) You are solely responsible for your use of the Software
   b) You will only use the Software for lawful, authorized purposes
   c) You assume all legal and ethical responsibility for your actions
   d) You will not hold the authors liable for any consequences of use
   e) You understand the legal and ethical implications of security testing
   f) You will follow responsible disclosure practices

7. ATTRIBUTION

   If you use, modify, or distribute this Software, you must:
   
   a) Retain this license notice and copyright information
   b) Provide attribution to the original authors and research:
      - SafeBreach Labs (CVE-2026-24061 original research)
      - Terminus development team
   c) Clearly mark any modifications made to the Software
   d) Not use the names of authors or contributors for endorsement

8. COMPLIANCE WITH LAWS

   You must comply with all applicable laws including but not limited to:
   
   a) Computer Fraud and Abuse Act (CFAA) - United States
   b) Computer Misuse Act - United Kingdom
   c) Council of Europe Convention on Cybercrime
   d) Local and national computer crime legislation
   e) Data protection and privacy laws (GDPR, CCPA, etc.)

9. MODIFICATION AND DISTRIBUTION

   You may modify and distribute the Software provided that:
   
   a) All modifications are clearly documented
   b) This license is included with all copies
   c) Attribution to original authors is maintained
   d) Modified versions are marked as such
   e) Distribution does not violate any terms of this license

10. GOVERNMENT USE

    This Software is designed for use by government security agencies, military
    organizations, and authorized contractors for:
    
    a) National security assessments
    b) Infrastructure protection
    c) Threat detection and mitigation
    d) Security compliance validation
    e) Authorized offensive security operations

    Government users must ensure use complies with applicable regulations and 
    directives governing offensive security tools.

11. REVOCATION

    The authors reserve the right to revoke this license if:
    
    a) The Software is used for unauthorized or illegal purposes
    b) Terms of this license are violated
    c) Use causes harm to systems, networks, or individuals
    d) User fails to comply with responsible disclosure practices

12. NO TECHNICAL SUPPORT

    The Software is provided without technical support or maintenance guarantees.
    The authors are under no obligation to provide updates, patches, or assistance.

13. INDEMNIFICATION

    You agree to indemnify and hold harmless the authors, contributors, and 
    copyright holders from any claims, damages, or legal actions arising from 
    your use of the Software.

14. SEVERABILITY

    If any provision of this license is found to be unenforceable or invalid, 
    that provision shall be limited or eliminated to the minimum extent necessary
    so that this license shall otherwise remain in full force and effect.

15. ENTIRE AGREEMENT

    This license constitutes the entire agreement between you and the authors 
    regarding use of the Software and supersedes all prior agreements.

BY USING THIS SOFTWARE, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND 
AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE.

IF YOU DO NOT AGREE TO THESE TERMS, DO NOT USE, MODIFY, OR DISTRIBUTE THIS 
SOFTWARE.

---

CONTACT INFORMATION

For licensing inquiries, security issues, or responsible disclosure:
- Email: [email protected]
- GitHub: https://github.com/ridpath/terminus

For vulnerability reports in systems discovered using this tool, follow 
responsible disclosure practices and coordinate with system owners.

---

CVE-2026-24061 ATTRIBUTION

This Software includes research and exploit code based on:
- SafeBreach Labs: https://github.com/SafeBreach-Labs/CVE-2026-24061
- TryA9ain: https://github.com/TryA9ain/CVE-2026-24061

Original research credit belongs to the discoverers of CVE-2026-24061.

---

LAST UPDATED: January 30, 2026
VERSION: 1.0.0