Ethical Use Policy
EP Cybertools is an educational cybersecurity portal designed to help security professionals, system administrators, developers, and students understand and improve the security posture of systems they are authorized to manage or study.
We believe that knowledge is the foundation of good security. By providing free, accessible tools for DNS diagnostics, email security (SPF/DKIM/DMARC), SSL/TLS analysis, and network inspection, we empower users to defend systems — never to attack them.
The tools on this site are intended for the following authorized and ethical purposes:
- Authorized security audits: Testing and diagnosing systems you own or have written permission to test.
- Educational research: Learning about cybersecurity concepts, protocols, and best practices in a controlled, authorized environment.
- System administration: Verifying the configuration of DNS, email, SSL/TLS, and network infrastructure you manage.
- Penetration testing (authorized): Security assessments performed under a signed statement of work, bug bounty program, or explicit written authorization from the target organization.
- Academic and classroom use: Teaching or studying network security, cryptography, and related fields with appropriate supervision and ethical guidelines.
- Compliance verification: Checking your organization's email deliverability, DMARC records, SSL certificates, or security headers for regulatory or internal compliance.
The following activities are strictly prohibited and violate this Ethical Use Policy as well as applicable laws:
- Unauthorized access: Using any tool to probe, scan, or test systems, networks, or domains without explicit authorization from the owner.
- Malicious hacking: Any form of intrusion, exploitation, or unauthorized manipulation of computer systems or networks.
- Stalking or surveillance: Using tools to track, monitor, or gather information about individuals without their knowledge or consent.
- Spyware or stalkerware: Any use of our tools to build, deploy, or assist software designed to covertly monitor individuals.
- DRM circumvention: Bypassing digital rights management systems or content protection mechanisms.
- Harassment or doxxing: Collecting or publishing private information about individuals for harmful purposes.
- Spam infrastructure: Analyzing mail server configurations with the intent to exploit them for sending unsolicited messages.
- Criminal activity: Any use of tools in furtherance of illegal activity under any applicable local, national, or international law.
Unauthorized access to computer systems is illegal in virtually all jurisdictions. Applicable laws include, but are not limited to:
- Chile: Ley N° 19.223 (Delitos Informáticos) and subsequent amendments criminalizing unauthorized computer access.
- United States: Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030.
- European Union: Directive 2013/40/EU on attacks against information systems.
- United Kingdom: Computer Misuse Act 1990.
- Other applicable national and international laws governing computer access and cybercrime.
EP Cybertools is not responsible for and expressly disclaims liability for any misuse of our tools. Users who violate this policy may be subject to termination of access, reporting to law enforcement, and civil or criminal liability.
Before using any diagnostic or testing tool on this site, ask yourself:
- Do I own this system? — If yes, proceed.
- Do I have written authorization from the owner? — If yes, proceed.
- Am I operating under a valid bug bounty or pentest agreement? — If yes, proceed.
- None of the above? — Stop. Do not proceed without authorization. Look up the public information through official channels instead.
If you discover a security vulnerability while using our tools against authorized systems, we encourage you to follow responsible disclosure principles:
- Notify the affected organization privately and promptly.
- Give them reasonable time (typically 90 days) to remediate before public disclosure.
- Do not exploit the vulnerability beyond what is necessary to demonstrate it.
- Follow the organization's coordinated vulnerability disclosure or bug bounty program if one exists.
If you believe our tools are being misused or if you have observed activity that violates this policy, please contact us immediately:
- Email: [email protected]
- Contact form: epcybertools.com/contact
EP Cybertools provides all tools on an "as-is" basis for educational and authorized security research purposes only. Results generated by our tools are informational and should not be construed as professional security advice. We make no warranty regarding the accuracy, completeness, or fitness for a particular purpose of any tool output.
We are not liable for any direct, indirect, incidental, special, or consequential damages arising from the use or misuse of our tools, including any unauthorized testing performed in violation of this policy.
Summary: Ethical Cybersecurity
EP Cybertools supports the global cybersecurity community by providing free, accessible tools for defensive security. We are committed to education, transparency, and responsible use. Always get authorization. Always act ethically.