51 líneas
2.2 KiB
Plaintext
51 líneas
2.2 KiB
Plaintext
MIT License
|
|
|
|
Copyright (c) 2024 AleShell Contributors
|
|
|
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
of this software and associated documentation files (the "Software"), to deal
|
|
in the Software without restriction, including without limitation the rights
|
|
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
copies of the Software, and to permit persons to whom the Software is
|
|
furnished to do so, subject to the following conditions:
|
|
|
|
The above copyright notice and this permission notice shall be included in all
|
|
copies or substantial portions of the Software.
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
SOFTWARE.
|
|
|
|
---
|
|
|
|
## Additional Terms for AleShell
|
|
|
|
### Intended Use
|
|
This software is intended for legitimate system administration and authorized
|
|
security testing purposes only. Users must ensure they have proper authorization
|
|
before using this software on any system they do not own.
|
|
|
|
### Responsibility
|
|
Users are solely responsible for ensuring their use of this software complies
|
|
with all applicable laws, regulations, and policies. The authors and contributors
|
|
of AleShell disclaim any responsibility for misuse of this software.
|
|
|
|
### Security Notice
|
|
This software provides administrative access to systems. Users must:
|
|
- Secure the installation with strong passwords
|
|
- Use HTTPS in production environments
|
|
- Restrict access to authorized personnel only
|
|
- Monitor and log access appropriately
|
|
- Remove the software when no longer needed
|
|
|
|
### Acknowledgments
|
|
This project is inspired by and builds upon the work of the b374k project and
|
|
other web shell implementations. We acknowledge the contributions of all
|
|
developers in the security tools community.
|
|
|
|
### Disclaimer
|
|
THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. USE AT YOUR OWN RISK. |