Ethical Rules

Sensitive, confidential or private information that we encounter with the weaknesses of companies and products after any ethical attack will never be disclosed.

Laws, rules and regulations will not be violated in handling sensitive personal, financial or private information that we encounter with the weaknesses of firms and products after any ethical attack.

After any ethical attack, transparency will be maintained with the companies and necessary information and weakness prevention recommendations will be made to the companies about the weaknesses detected.

As an ethical hacker, we will prioritize our reliability.

After any ethical attack, we will never disclose the private information we obtain when we encounter the weaknesses of the companies and products. We will ensure that the sensitivity of companies and products in this regard is preserved.

We commit that we will not cause any harm to users by using the weaknesses of companies and products after any ethical attack.

After any ethical attack, we undertake to share the parts of firms and products detected that need to be shared in order to raise awareness of users.

All content posted on our blog pages are shared with you to increase your cyber security awareness and knowledge in accordance with ethical hacker rules.

No liability is accepted for damages to third parties using the content published on our blog pages.