-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathLICENSE
More file actions
50 lines (40 loc) · 1.89 KB
/
LICENSE
File metadata and controls
50 lines (40 loc) · 1.89 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
GhostKey Proprietary License
Copyright (c) 2026 talkdedsec & threatvec. All Rights Reserved.
TERMS AND CONDITIONS
1. GRANT OF LICENSE
This software is provided as-is for personal, educational, and internal
business use only. You may download, install, and use the compiled binary
of GhostKey free of charge.
2. RESTRICTIONS
You may NOT:
a) Modify, adapt, translate, or create derivative works of this software
b) Redistribute, sublicense, sell, or commercially exploit this software
c) Remove, alter, or obscure any copyright notices, author attributions,
or signature verifications embedded in the software
d) Reverse engineer, decompile, or disassemble the compiled binary
e) Publish or distribute modified versions under any name
f) Use the source code to create competing products
g) Claim authorship or ownership of this software or any part of it
3. ATTRIBUTION
This software was created by talkdedsec & threatvec.
All copies must retain the original author attribution.
Removal of embedded signatures constitutes a license violation.
4. SOURCE CODE
The source code is provided for transparency and security auditing
purposes only. Access to source code does NOT grant modification
or redistribution rights.
5. CONTRIBUTIONS
By submitting a contribution (pull request), you agree to transfer
all rights to the contribution to the original authors.
6. TERMINATION
This license is automatically terminated if you violate any of
the above terms. Upon termination, you must destroy all copies
of the software in your possession.
7. DISCLAIMER
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND.
THE AUTHORS SHALL NOT BE LIABLE FOR ANY DAMAGES ARISING FROM
THE USE OF THIS SOFTWARE.
8. CONTACT
GitHub: https://github.com/threatvec/ghostkey
Authors: talkdedsec & threatvec
(c) 2026 talkdedsec & threatvec — All Rights Reserved