This C2 client is provided solely for legitimate security research, training, and authorized red-team operations. Its purpose is to help defenders understand command-and-control mechanisms and strengthen detection, prevention, and response strategies.
Any use of this software in environments where you do not have explicit, written permission is strictly prohibited.
Unauthorized access, exploitation, deployment, or misuse of this tool may violate laws and can result in criminal or civil penalties.
The repository owner, contributors, and maintainers do not endorse or take responsibility for any illegal or unethical activities carried out with this software.
All responsibility for proper, lawful usage rests entirely with the user.
Use responsibly, ethically, and only in controlled environments with authorization.