End User License Agreement
IRIS C2 Software License Terms and Conditions
Effective Date: January 1, 2025
1. Acceptance of Terms
By accessing, downloading, installing, or using IRIS C2 software ("Software"), you agree to be bound by the terms and conditions of this End User License Agreement ("Agreement"). If you do not agree to these terms, do not use the Software.
2. Authorized Use Only
IRIS C2 is designed exclusively for authorized security testing, penetration testing, red team exercises, and security research by qualified professionals. Permitted uses include:
- Authorized penetration testing with explicit written permission
- Red team exercises within your own organization
- Security research in controlled environments
- Educational purposes in accredited security programs
- Vulnerability assessment with proper authorization
3. Prohibited Activities
You expressly agree NOT to use the Software for:
- Unauthorized access to computer systems, networks, or data
- Any illegal activities or criminal purposes
- Malicious attacks against systems you do not own or have permission to test
- Data theft, destruction, or unauthorized modification
- Harassment, stalking, or privacy violations
- Any activity that violates local, state, national, or international laws
4. User Responsibilities
As a user of IRIS C2, you are responsible for:
- Ensuring you have proper authorization before conducting any security testing
- Complying with all applicable laws and regulations
- Maintaining the confidentiality and security of the Software
- Using the Software in accordance with professional ethical standards
- Reporting any security vulnerabilities discovered through authorized testing
5. License Grant
Subject to your compliance with this Agreement, IRIS C2 Systems grants you a limited, non-exclusive, non-transferable license to use the Software solely for authorized security testing purposes. This license does not grant you any rights to the Software's source code, algorithms, or proprietary methodologies.
6. Intellectual Property
The Software and all related materials are protected by copyright, trade secret, and other intellectual property laws. IRIS C2 Systems retains all rights, title, and interest in and to the Software. You may not reverse engineer, decompile, disassemble, or attempt to derive the source code of the Software.
7. Disclaimer of Warranties
THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IRIS C2 SYSTEMS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT.
8. Limitation of Liability
IN NO EVENT SHALL IRIS C2 SYSTEMS BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, OR PUNITIVE DAMAGES, INCLUDING BUT NOT LIMITED TO LOSS OF PROFITS, DATA, OR USE, ARISING OUT OF OR RELATING TO YOUR USE OF THE SOFTWARE.
9. Indemnification
You agree to indemnify, defend, and hold harmless IRIS C2 Systems from and against any claims, damages, losses, costs, and expenses arising from your use of the Software, including any unauthorized or illegal use.
10. Termination
This Agreement is effective until terminated. IRIS C2 Systems may terminate this Agreement immediately if you breach any provision. Upon termination, you must cease all use of the Software and destroy all copies in your possession.
11. Governing Law
This Agreement shall be governed by and construed in accordance with the laws of the jurisdiction where IRIS C2 Systems is incorporated, without regard to conflict of law principles.
12. Contact Information
For questions about this Agreement or the Software, please contact us at contact@irisc2.com
Important Notice: This software is intended for use by security professionals only. Unauthorized use of this software may violate federal, state, and local laws. Users are solely responsible for ensuring their use complies with all applicable laws and regulations.