Acceptable Use Policy

Last updated: February 2026

1. Defensive Learning Only

This platform exists solely for defensive cybersecurity education. All skills, techniques, and knowledge gained must be applied only for legitimate defensive purposes, including malware analysis, incident response, threat intelligence, and detection engineering.

2. No Distribution of Samples

You must not redistribute, share, or make available any malware samples obtained through external sources referenced on this platform. Samples should be kept strictly within your isolated analysis environment and deleted after use.

3. VM Isolation Requirement

All malware analysis must be performed inside an isolated virtual machine with the following configuration:

  • Host-only networking or no network access
  • Clean snapshot taken before analysis begins
  • Revert to snapshot after analysis is complete
  • No shared folders between host and guest
  • Guest additions/tools should be minimal

4. Ethical Conduct

You agree to conduct yourself ethically and professionally. This includes:

  • Not using techniques learned here against systems without explicit authorization
  • Reporting any vulnerabilities responsibly through proper channels
  • Respecting the intellectual property of malware researchers and sample providers
  • Not engaging in any activity that could harm others or damage systems

5. Account Termination for Violations

Violation of this acceptable use policy may result in immediate account suspension or permanent termination without prior notice. We take misuse of cybersecurity education seriously and will act to protect the community and the broader public.