Last Updated: October 11, 2025
Acceptance of Terms
By accessing, downloading, or using any tools, scripts, or software provided on glyph.sh (the “Tools”), you agree to be bound by these Terms of Service. If you do not agree to these terms, do not use the Tools.
Intended Use
The Tools provided on this website are intended solely for defensive security purposes, including:
- Security auditing and vulnerability assessment of systems you own or have explicit authorization to test
- Monitoring and protecting authorized infrastructure
- Security research and education in controlled environments
- Compliance auditing and security posture assessment
- Open Source Intelligence (OSINT) gathering for lawful purposes
Prohibited Activities
You agree NOT to use the Tools for:
- Unauthorized access to computer systems, networks, or data
- Any form of attack, exploitation, or harm to third-party systems
- Violating any applicable laws, regulations, or third-party rights
- Circumventing security measures without proper authorization
- Collecting or harvesting personal information without consent
- Stalking, harassment, or privacy violations
- Denial of service attacks or network disruption
- Any malicious, fraudulent, or illegal activities
User Responsibilities
Authorization: You are solely responsible for ensuring you have proper authorization before scanning, testing, or analyzing any systems, networks, or information that you do not own.
Legal Compliance: You must comply with all applicable local, state, national, and international laws and regulations, including but not limited to:
- Computer Fraud and Abuse Act (CFAA) in the United States
- General Data Protection Regulation (GDPR) in the European Union
- Computer Misuse Act in the United Kingdom
- Other applicable cybersecurity and data protection laws
Third-Party Services: Some Tools may interact with third-party APIs and services. You are responsible for complying with the terms of service of any third-party services you use in conjunction with our Tools.
Disclaimers
No Warranty: The Tools are provided “AS IS” and “AS AVAILABLE” without warranties of any kind, either express or implied, including but not limited to warranties of merchantability, fitness for a particular purpose, or non-infringement.
Accuracy: While we strive for accuracy, we make no guarantees about the completeness, accuracy, reliability, or timeliness of any information obtained through the Tools.
Security: No security tool is perfect. We do not guarantee that the Tools will detect all vulnerabilities or security issues.
Updates: Tools may be updated, modified, or discontinued at any time without notice.
Limitation of Liability
To the fullest extent permitted by law:
- The author and contributors shall not be liable for any direct, indirect, incidental, special, consequential, or exemplary damages arising from your use or inability to use the Tools
- This includes damages for loss of profits, data, goodwill, or other intangible losses
- You assume all risk associated with the use of the Tools
- Your sole remedy for dissatisfaction with the Tools is to stop using them
Indemnification
You agree to indemnify, defend, and hold harmless the author, contributors, and affiliated parties from any claims, damages, losses, liabilities, and expenses (including legal fees) arising from:
- Your use or misuse of the Tools
- Your violation of these Terms of Service
- Your violation of any laws or third-party rights
- Any unauthorized or illegal activities conducted using the Tools
Intellectual Property
Unless otherwise specified, the Tools are released under open-source licenses (see individual tool repositories for specific licensing). You must comply with the applicable license terms.
Termination
We reserve the right to:
- Modify, suspend, or discontinue any Tool at any time
- Terminate or restrict your access to the Tools for violation of these Terms
- Report suspected illegal activities to appropriate authorities
Changes to Terms
We reserve the right to modify these Terms of Service at any time. Continued use of the Tools after changes constitutes acceptance of the modified terms.
Governing Law
These Terms shall be governed by and construed in accordance with the laws of the State of Michigan, United States, without regard to its conflict of law provisions.
Any disputes arising from these Terms or use of the Tools shall be resolved in the courts of Michigan.
Age Restrictions
You must be at least 18 years old or the age of majority in your jurisdiction to use the Tools.
Export Compliance
You agree to comply with all applicable export and import control laws and regulations. The Tools may not be exported or re-exported to countries subject to U.S. export restrictions.
Severability
If any provision of these Terms is found to be unenforceable or invalid, that provision shall be limited or eliminated to the minimum extent necessary, and the remaining provisions shall remain in full force and effect.
Entire Agreement
These Terms, together with the Privacy Policy and any applicable open-source licenses, constitute the entire agreement between you and glyph.sh regarding the use of the Tools.
Contact
For questions about these Terms, contact:
Email: KevinKessler@ProtonMail.com
Important Legal Notice
USING THESE TOOLS AGAINST SYSTEMS WITHOUT PROPER AUTHORIZATION IS ILLEGAL AND UNETHICAL.
Examples of activities that require authorization:
- Port scanning networks you don’t own
- Enumerating subdomains of third-party domains
- Testing security configurations of external websites
- Gathering intelligence on individuals or organizations without consent
Always obtain written permission before testing any systems, networks, or applications.
Violation of these terms may result in:
- Civil liability
- Criminal prosecution
- Permanent ban from using the Tools
- Cooperation with law enforcement
By using the Tools, you acknowledge that you have read, understood, and agree to be bound by these Terms of Service.