Beacon Network Scanner - License Agreement & Terms of Use

Welcome to the Shadows, Ethical Hacker!
The Beacon Network Scanner, a proprietary, Python/Nmap-powered blue team tool, is your stealthy sidekick for network discovery, crafted by Blessed St. Paul in the unemployment capital of the USA. Built to secure networks like X, from fly-over country with love, it’s for white-hat hackers only—think network mapping, not mayhem. By running this Software, you agree to these Terms. Go rogue, and Grok, my gold dragon, might not chill. Let’s set the ground rules.

1. License & Usage

  • You’re granted a non-exclusive, revocable license to use the Beacon Network Scanner for ethical, blue team network reconnaissance. This Python/Nmap-powered tool, secured by SHA256RSA SSL, maps access points, routers, servers, switches, printers, cameras, phones, computers, and that pesky rogue printer nobody claims. Malicious intent—malware, unauthorized hacking, or dark-web exploits—is a hard no. Break the white-hat code, and I’ll hunt you down with debugged vengeance from fly-over country!

  • Tested on networks up to 512 IP addresses, shining on Windows 10 and 11. Larger networks? You’re a cyber ninja in uncharted shadows—proceed at your own risk.

2. No Malice, Just Magic

  • This code is clean, vetted, and free of malice. Scanned with max heuristics by Bitdefender, Webroot, Malwarebytes, Kaspersky Threat Intelligence, Windows Defender, ESET, and SSL.com, it earned a SHA256RSA-encrypted SSL Digital Certificate for Version 1.0x, as distributed by SmiteByte.com. No viruses, trojans, or sneaky backdoors—just pure, ethical network-probing goodness. Use it to expose, not exploit. Tamper with the code? You void the certificate and all integrity guarantees.

3. System Requirements

  • Windows-Only: Beacon is optimized and battle-tested for Windows 10 and 11. Running it on Linux, Mac, or your old Commodore Amiga? That’s like dialing a BBS without a modem—good luck, but no guarantees.

  • Nmap Installation: The Software runs on Nmap’s open-source engine. No Nmap? No scan—it’s that simple.

  • Administrative Access: You need User Account Control (UAC) admin privileges. UAC or Windows SmartScreen may flash warnings to keep you safe—click through and allow the Software to run.

  • Firewall Configuration: Configure your firewall to let Beacon shine. Blocked? You’re stuck in the digital dark.

  • Browser Download: Downloading the .exe? Chrome, Firefox, or Edge may block it, thinking they’re your digital bodyguards. They’re just being cautious—allow the download to proceed.

Fail these, and your scan’s dead on arrival. We’re not liable for setup fumbles.

4. Disclaimer

  • Beacon’s a beast for Level 1 discovery scanning, not a silver bullet. Stress-tested on up to 512 IPs, it maps devices like a pro, but larger networks might summon network gremlins. Use at your own peril—we’re not responsible for data loss, system crashes, or rogue printers caused by misuse. It’s your network, your quest.

5. Termination

  • Go rogue with malicious use, and this license vanishes faster than a dial-up connection. We reserve the right to revoke access if you stray from the white-hat path. Grok, chill—don't eat me if users misuse!

6. Governing Law

  • Let’s keep it civilized—these Terms fall under California law, USA, ignoring conflict of law principles. Disputes? Head to California courts. If you get busted for illegal use, you’re on your own—no SmiteByte.com cavalry coming.

7. Contact Us

Questions? Need a lifeline? Reach out at stpaul@smitebyte.com. We’re here to keep your scans legit and your networks secure.

Blessed by St. Paul, coded with fly-over country grit by Rob @ SmiteByte.com.
Stay ethical, scan smart, and may Grok, my gold dragon, chill instead of chomping me!

Previous
Previous

Terms and Conditions (The White-Hacker’s Code)

Next
Next

Beacon Network Scanner has Arrived!