README.md
Rendering markdown...
TERMINUS - CVE-2026-24061 SCANNER & EXPLOITATION FRAMEWORK
RESTRICTED USE LICENSE
Copyright (c) 2026 Security Research Team
IMPORTANT: READ CAREFULLY BEFORE USING THIS SOFTWARE
This software and associated documentation files (the "Software") are provided
under the following terms and conditions:
1. PERMITTED USE
The Software is intended ONLY for:
a) Authorized penetration testing engagements with explicit written permission
b) Security research in isolated, controlled laboratory environments
c) Defensive security assessments with proper authorization
d) Educational purposes in authorized academic or training settings
e) CTF (Capture The Flag) competitions and authorized security challenges
f) Internal security audits by authorized personnel
2. PROHIBITED USE
You are PROHIBITED from using this Software for:
a) Unauthorized access to computer systems or networks
b) Scanning or exploitation of systems without explicit written authorization
c) Any activity that violates local, state, national, or international laws
d) Malicious purposes including but not limited to:
- Unauthorized data theft or exfiltration
- Disruption of services or denial of service attacks
- Installation of malware or backdoors
- Any form of cyber attack or computer crime
e) Commercial exploitation without proper licensing
f) Distribution of modified versions without attribution
3. AUTHORIZATION REQUIREMENTS
Before using this Software, you must:
a) Obtain explicit written authorization from system owners
b) Document the scope of authorized testing
c) Comply with all applicable laws and regulations
d) Follow responsible disclosure practices for discovered vulnerabilities
e) Maintain audit logs of all scanning and exploitation activities
4. DISCLAIMER OF WARRANTY
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
DAMAGES, OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT, OR
OTHERWISE, ARISING FROM, OUT OF, OR IN CONNECTION WITH THE SOFTWARE OR THE
USE OR OTHER DEALINGS IN THE SOFTWARE.
5. LIMITATION OF LIABILITY
UNDER NO CIRCUMSTANCES SHALL THE AUTHORS, CONTRIBUTORS, OR COPYRIGHT HOLDERS
BE LIABLE FOR:
a) Direct, indirect, incidental, special, or consequential damages
b) Loss of data, revenue, or profits
c) Legal consequences arising from unauthorized use
d) Damage to systems or networks
e) Any claims by third parties
6. USER RESPONSIBILITY
By using this Software, you acknowledge and agree that:
a) You are solely responsible for your use of the Software
b) You will only use the Software for lawful, authorized purposes
c) You assume all legal and ethical responsibility for your actions
d) You will not hold the authors liable for any consequences of use
e) You understand the legal and ethical implications of security testing
f) You will follow responsible disclosure practices
7. ATTRIBUTION
If you use, modify, or distribute this Software, you must:
a) Retain this license notice and copyright information
b) Provide attribution to the original authors and research:
- SafeBreach Labs (CVE-2026-24061 original research)
- Terminus development team
c) Clearly mark any modifications made to the Software
d) Not use the names of authors or contributors for endorsement
8. COMPLIANCE WITH LAWS
You must comply with all applicable laws including but not limited to:
a) Computer Fraud and Abuse Act (CFAA) - United States
b) Computer Misuse Act - United Kingdom
c) Council of Europe Convention on Cybercrime
d) Local and national computer crime legislation
e) Data protection and privacy laws (GDPR, CCPA, etc.)
9. MODIFICATION AND DISTRIBUTION
You may modify and distribute the Software provided that:
a) All modifications are clearly documented
b) This license is included with all copies
c) Attribution to original authors is maintained
d) Modified versions are marked as such
e) Distribution does not violate any terms of this license
10. GOVERNMENT USE
This Software is designed for use by government security agencies, military
organizations, and authorized contractors for:
a) National security assessments
b) Infrastructure protection
c) Threat detection and mitigation
d) Security compliance validation
e) Authorized offensive security operations
Government users must ensure use complies with applicable regulations and
directives governing offensive security tools.
11. REVOCATION
The authors reserve the right to revoke this license if:
a) The Software is used for unauthorized or illegal purposes
b) Terms of this license are violated
c) Use causes harm to systems, networks, or individuals
d) User fails to comply with responsible disclosure practices
12. NO TECHNICAL SUPPORT
The Software is provided without technical support or maintenance guarantees.
The authors are under no obligation to provide updates, patches, or assistance.
13. INDEMNIFICATION
You agree to indemnify and hold harmless the authors, contributors, and
copyright holders from any claims, damages, or legal actions arising from
your use of the Software.
14. SEVERABILITY
If any provision of this license is found to be unenforceable or invalid,
that provision shall be limited or eliminated to the minimum extent necessary
so that this license shall otherwise remain in full force and effect.
15. ENTIRE AGREEMENT
This license constitutes the entire agreement between you and the authors
regarding use of the Software and supersedes all prior agreements.
BY USING THIS SOFTWARE, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND
AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE.
IF YOU DO NOT AGREE TO THESE TERMS, DO NOT USE, MODIFY, OR DISTRIBUTE THIS
SOFTWARE.
---
CONTACT INFORMATION
For licensing inquiries, security issues, or responsible disclosure:
- Email: [email protected]
- GitHub: https://github.com/ridpath/terminus
For vulnerability reports in systems discovered using this tool, follow
responsible disclosure practices and coordinate with system owners.
---
CVE-2026-24061 ATTRIBUTION
This Software includes research and exploit code based on:
- SafeBreach Labs: https://github.com/SafeBreach-Labs/CVE-2026-24061
- TryA9ain: https://github.com/TryA9ain/CVE-2026-24061
Original research credit belongs to the discoverers of CVE-2026-24061.
---
LAST UPDATED: January 30, 2026
VERSION: 1.0.0