Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. 🔰 Welcome
  3. Rules & Announcements
  4. Forum Rules & Guidelines 🔰

Forum Rules & Guidelines 🔰

Scheduled Pinned until 04/01/2027, 02:57 Locked Moved Rules & Announcements
1 Posts 1 Posters 52 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • XploitLKX Offline
    XploitLKX Offline
    XploitLK
    wrote last edited by XploitLK
    #1

    General Forum Rules

    1. Respect & Professional Conduct

    • Treat all members with respect and courtesy
    • No harassment, bullying, discrimination, or personal attacks
    • Disagree with ideas, not people - keep discussions constructive
    • No hate speech, offensive language, or inappropriate content
    • Respect different skill levels - we all started as beginners

    2. Quality Content

    • Use clear, descriptive thread titles
    • Post in the appropriate category
    • Search before posting to avoid duplicates
    • Stay on topic within threads
    • No spam, advertising, or self-promotion without moderator approval
    • Use proper formatting and code blocks for technical content

    3. Account & Privacy

    • One account per person
    • No impersonation of others or organizations
    • Protect your own privacy - don't share sensitive personal information
    • Respect others' privacy - no doxxing or sharing private information

    4. Language & Communication

    • English & Sinhala are the primary languages (unless in designated areas)
    • Use proper grammar and spelling when possible
    • Avoid excessive use of caps, emojis, or text speak
    • No trolling, flame wars, or derailing discussions

    5. Moderation

    • Moderator decisions are final
    • Report rule violations using the report button
    • Don't mini-mod (backseat moderate) - let moderators handle issues
    • Constructive feedback about the forum is welcome in Site Feedback

    Cybersecurity Ethical Guidelines

    1. Legal Compliance

    • All activities discussed must be legal in your jurisdiction
    • Only perform security testing on systems you own or have explicit written permission to test
    • Unauthorized access to computer systems is illegal and will result in immediate ban
    • Do not discuss or facilitate illegal activities

    2. Responsible Disclosure

    • Follow responsible disclosure practices for vulnerabilities
    • Do not publicly disclose unpatched vulnerabilities or zero-days
    • Give vendors reasonable time to patch before disclosure (typically 90 days)
    • Coordinate with security teams when reporting vulnerabilities

    3. Prohibited Content

    Absolutely no posting of:

    • Malware, viruses, ransomware, or malicious code designed to harm systems
    • Working exploits for unpatched vulnerabilities
    • Personal data obtained without authorization (passwords, credit cards, PII)
    • Instructions for illegal hacking or unauthorized access
    • Phishing kits, credential stuffers, or fraud tools
    • Methods to bypass security for illegal purposes

    4. Educational Purpose Only

    • All security discussions must be for educational and defensive purposes
    • Tools and techniques should be used to improve security, not compromise it
    • When discussing offensive security, always emphasize ethical boundaries
    • CTF writeups and lab exercises are encouraged

    5. Vulnerability Discussion Guidelines

    You MAY discuss:

    • Publicly disclosed CVEs with available patches
    • Theoretical attack vectors for educational purposes
    • Security research methodologies
    • Defensive strategies and mitigations

    You MAY NOT share:

    • Private exploits or proof-of-concept code for active threats
    • Details that could enable attacks on unpatched systems
    • Information about targets without their consent

    6. Penetration Testing Ethics

    • Always obtain written authorization before testing
    • Define clear scope and rules of engagement
    • Respect boundaries and stop if you find critical issues
    • Report findings professionally and responsibly
    • Do not access, modify, or delete data beyond what's necessary

    7. Tool Usage Responsibility

    • Security tools are dual-use - use them ethically
    • Document legitimate use cases when sharing tools
    • Warn about potential misuse implications
    • Do not provide step-by-step instructions for malicious use

    8. Data Handling

    • Do not share leaked databases or stolen credentials
    • Respect data privacy laws (GDPR, CCPA, etc.)
    • Use sample/dummy data in examples and tutorials
    • Properly anonymize any real-world examples

    Consequences for Rule Violations

    Warning System

    1. First Offense: Written warning and content removal
    2. Second Offense: Temporary ban (7-30 days)
    3. Third Offense: Permanent ban

    Immediate Permanent Ban

    • Sharing malware or malicious code
    • Posting illegal content
    • Doxxing or sharing private information
    • Coordinating illegal activities
    • Creating multiple accounts to evade bans

    Serious Violations

    The following will be reported to appropriate authorities:

    • Discussion or planning of illegal hacking
    • Sharing exploits for critical infrastructure
    • Child exploitation material
    • Terrorism or violence planning
    • Large-scale fraud schemes

    Best Practices for Community Members

    For Beginners

    • Read the stickied posts in each section
    • Use the search function before asking questions
    • Provide context when asking for help
    • Show what you've already tried
    • Thank those who help you

    For Advanced Members

    • Be patient with beginners
    • Explain concepts, don't just give answers
    • Share knowledge generously but responsibly
    • Mentor others in their learning journey
    • Lead by example in ethical conduct

    For Everyone

    • Think before you post: Would this help or harm someone?
    • Ask yourself: Is this legal and ethical?
    • Remember: Everything you post is permanent and may be seen by future employers
    • Stay curious: Security is always evolving - keep learning
    • Give back: Help others as you've been helped

    Reporting Violations

    If you see content that violates these rules:

    1. Use the Report button on the post
    2. Provide specific details about the violation
    3. Do not engage with the violator
    4. Let moderators handle the situation

    For urgent security concerns or illegal activity: Contact moderators immediately via private message.


    Contact Moderators

    For questions about these rules or to appeal a moderation decision, contact the moderation team through:

    • Private message to moderators
    • Site Feedback section (for non-urgent matters)

    By participating in this forum, you agree to abide by these rules. Ignorance of the rules is not an excuse for violations.

    Last Updated: January 2026
    These rules may be updated at any time. Check regularly for changes.

    1 Reply Last reply
    0
    • XploitLKX XploitLK pinned this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Don't have an account? Register

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups