Copyright Notice
Intellectual property rights and licensing for PhishDestroy content and tools.
PhishDestroy is a volunteer-driven, fully open-source project committed to transparency and ethical operation. This policy outlines our stance on intellectual property, the MIT License, and guidelines for using our materials.
Open Source and MIT License
All code, tools, data, reports, threat intelligence, and research produced by the PhishDestroy project are released under the MIT License. Every decision — every addition, removal, and change — is publicly visible in our GitHub repositories.
Under the MIT License, you are free to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of our data and tools for any lawful purpose. Attribution to PhishDestroy is appreciated but not legally required. If you use our data, you do so under your own name and responsibility.
To the extent that our threat intelligence feeds are considered a database, we waive any database rights and release the data under the same permissive terms as our software.
License Restrictions: Notwithstanding the MIT License, the use of PhishDestroy tools, code, or data is strictly prohibited for individuals, entities, or government agencies located in the Russian Federation or any jurisdictions under comprehensive international sanctions. The license is automatically revoked for any party using our work to facilitate cybercrime or bypass international sanctions.
Branding and Trademarks
The PhishDestroy name, logo, and visual branding are the intellectual property of the PhishDestroy project. While our data and code are freely available under MIT, the use of our brand identity (name, logo, visual assets) to represent or imply an official association, endorsement, or partnership requires prior written consent. You may reference PhishDestroy by name in factual contexts (e.g., "data sourced from PhishDestroy") without permission.
DMCA and Reporting Infringement
Fair Use Disclaimer: PhishDestroy often reproduces screenshots, code snippets, and technical indicators from malicious infrastructure for the purposes of criticism, commentary, news reporting, and cybersecurity research. We believe this constitutes "Fair Use" under Section 107 of the U.S. Copyright Act. We will contest bad-faith DMCA notices intended to suppress security research or hide evidence of criminal activity.
PhishDestroy fully complies with the Digital Millennium Copyright Act (DMCA). We are committed to addressing any valid claims of copyright infringement promptly. If you are a copyright holder and believe that your work has been used on our site in a way that constitutes copyright infringement, please send a formal DMCA takedown notice to our designated agent. Your notice must include: a detailed description of the copyrighted work, the specific location (URL) of the infringing material on our site, your contact information (address, telephone number, and email), and a statement made under penalty of perjury that you are the copyright owner or are authorized to act on their behalf. Please send all DMCA notices to dmca@phishdestroy.io for immediate review.
Contact for Copyright Inquiries
For general questions about this copyright policy or to request permission to use our materials in a manner not covered by our open-source licenses, please contact our legal team at copyright@phishdestroy.io. We are dedicated to fostering a collaborative and respectful environment and will address your inquiries as quickly as possible.