TERMINUS - CVE-2026-24061 SCANNER & EXPLOITATION FRAMEWORK RESTRICTED USE LICENSE Copyright (c) 2026 Security Research Team IMPORTANT: READ CAREFULLY BEFORE USING THIS SOFTWARE This software and associated documentation files (the "Software") are provided under the following terms and conditions: 1. PERMITTED USE The Software is intended ONLY for: a) Authorized penetration testing engagements with explicit written permission b) Security research in isolated, controlled laboratory environments c) Defensive security assessments with proper authorization d) Educational purposes in authorized academic or training settings e) CTF (Capture The Flag) competitions and authorized security challenges f) Internal security audits by authorized personnel 2. PROHIBITED USE You are PROHIBITED from using this Software for: a) Unauthorized access to computer systems or networks b) Scanning or exploitation of systems without explicit written authorization c) Any activity that violates local, state, national, or international laws d) Malicious purposes including but not limited to: - Unauthorized data theft or exfiltration - Disruption of services or denial of service attacks - Installation of malware or backdoors - Any form of cyber attack or computer crime e) Commercial exploitation without proper licensing f) Distribution of modified versions without attribution 3. AUTHORIZATION REQUIREMENTS Before using this Software, you must: a) Obtain explicit written authorization from system owners b) Document the scope of authorized testing c) Comply with all applicable laws and regulations d) Follow responsible disclosure practices for discovered vulnerabilities e) Maintain audit logs of all scanning and exploitation activities 4. DISCLAIMER OF WARRANTY THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES, OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT, OR OTHERWISE, ARISING FROM, OUT OF, OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. 5. LIMITATION OF LIABILITY UNDER NO CIRCUMSTANCES SHALL THE AUTHORS, CONTRIBUTORS, OR COPYRIGHT HOLDERS BE LIABLE FOR: a) Direct, indirect, incidental, special, or consequential damages b) Loss of data, revenue, or profits c) Legal consequences arising from unauthorized use d) Damage to systems or networks e) Any claims by third parties 6. USER RESPONSIBILITY By using this Software, you acknowledge and agree that: a) You are solely responsible for your use of the Software b) You will only use the Software for lawful, authorized purposes c) You assume all legal and ethical responsibility for your actions d) You will not hold the authors liable for any consequences of use e) You understand the legal and ethical implications of security testing f) You will follow responsible disclosure practices 7. ATTRIBUTION If you use, modify, or distribute this Software, you must: a) Retain this license notice and copyright information b) Provide attribution to the original authors and research: - SafeBreach Labs (CVE-2026-24061 original research) - Terminus development team c) Clearly mark any modifications made to the Software d) Not use the names of authors or contributors for endorsement 8. COMPLIANCE WITH LAWS You must comply with all applicable laws including but not limited to: a) Computer Fraud and Abuse Act (CFAA) - United States b) Computer Misuse Act - United Kingdom c) Council of Europe Convention on Cybercrime d) Local and national computer crime legislation e) Data protection and privacy laws (GDPR, CCPA, etc.) 9. MODIFICATION AND DISTRIBUTION You may modify and distribute the Software provided that: a) All modifications are clearly documented b) This license is included with all copies c) Attribution to original authors is maintained d) Modified versions are marked as such e) Distribution does not violate any terms of this license 10. GOVERNMENT USE This Software is designed for use by government security agencies, military organizations, and authorized contractors for: a) National security assessments b) Infrastructure protection c) Threat detection and mitigation d) Security compliance validation e) Authorized offensive security operations Government users must ensure use complies with applicable regulations and directives governing offensive security tools. 11. REVOCATION The authors reserve the right to revoke this license if: a) The Software is used for unauthorized or illegal purposes b) Terms of this license are violated c) Use causes harm to systems, networks, or individuals d) User fails to comply with responsible disclosure practices 12. NO TECHNICAL SUPPORT The Software is provided without technical support or maintenance guarantees. The authors are under no obligation to provide updates, patches, or assistance. 13. INDEMNIFICATION You agree to indemnify and hold harmless the authors, contributors, and copyright holders from any claims, damages, or legal actions arising from your use of the Software. 14. SEVERABILITY If any provision of this license is found to be unenforceable or invalid, that provision shall be limited or eliminated to the minimum extent necessary so that this license shall otherwise remain in full force and effect. 15. ENTIRE AGREEMENT This license constitutes the entire agreement between you and the authors regarding use of the Software and supersedes all prior agreements. BY USING THIS SOFTWARE, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE. IF YOU DO NOT AGREE TO THESE TERMS, DO NOT USE, MODIFY, OR DISTRIBUTE THIS SOFTWARE. --- CONTACT INFORMATION For licensing inquiries, security issues, or responsible disclosure: - Email: security@ridpath.com - GitHub: https://github.com/ridpath/terminus For vulnerability reports in systems discovered using this tool, follow responsible disclosure practices and coordinate with system owners. --- CVE-2026-24061 ATTRIBUTION This Software includes research and exploit code based on: - SafeBreach Labs: https://github.com/SafeBreach-Labs/CVE-2026-24061 - TryA9ain: https://github.com/TryA9ain/CVE-2026-24061 Original research credit belongs to the discoverers of CVE-2026-24061. --- LAST UPDATED: January 30, 2026 VERSION: 1.0.0