Compliance & Access Policy

Exploit Pack VOF
Last update: 20 March 2026

Exploit Pack VOF is committed to the lawful, responsible, and professionally controlled distribution of its software, including Exploit Pack, Control Pack, Kernel Pack, Ultimate Pack, and related products, updates, support, and technical materials.

This Customer Screening, Compliance, and Shipping Policy describes the measures we use to reduce legal, compliance, sanctions, export-control, fraud, misuse, and delivery-related risks.

1. Purpose

Our products are intended solely for legitimate professional cybersecurity use, including authorised penetration testing, internal security testing, red teaming, adversary simulation, research, training, detection engineering, and related lawful activities in controlled environments.

We do not knowingly provide products or support for unlawful, unauthorised, abusive, deceptive, criminal, or harmful use.

2. Scope

This Policy applies to new customers, renewals, resellers and intermediaries, support requests, update access, and any request for activation, transfer, re-issue, or expanded access.

3. Professional use only

Our software is offered only for professional use by qualified users and organisations.

Customers must confirm that they are acquiring the software for legitimate business, institutional, research, or authorised security-testing purposes, and not for personal, recreational, anonymous, or unlawful use.

4. Customer screening

Before activation, delivery, renewal, or continued support, Exploit Pack VOF may request and verify information including:

a. the legal name of the customer or organisation;
b. the company registration number or equivalent;
c. the country of establishment and country of use;
d. the full name, role, and contact details of the purchaser or authorised user;
e. the business email domain and invoicing details;
f. the intended use case and operational context;
g. whether use is internal or for authorised client work;
h. whether written authorisation exists for intended target systems; and
i. whether any reseller, intermediary, subcontractor, government entity, or other third party is involved.

Exploit Pack VOF may verify whether the purchasing party exists, whether the contact appears authorised to act on behalf of the organisation, and whether the transaction presents fraud, sanctions, export-control, or abuse risk.

5. End-use and end-user confirmation

Customers may be required to confirm, in writing or electronically, that:

a. the software will be used only for lawful and authorised cybersecurity purposes;
b. the software will be used only on systems owned by the customer or on systems for which explicit written authorisation has been obtained;
c. the license is personal and limited to one named user and one machine;
d. the software will not be resold, sublicensed, shared, or provided to unauthorised third parties; and
e. the software will not be used for criminal, deceptive, disruptive, or abusive activity.

6. Sanctions and export-control compliance

Exploit Pack VOF may screen customers, counterparties, and transactions for sanctions, export-control, trade-compliance, end-user, end-use, and jurisdictional risks.

We may refuse, delay, suspend, or terminate a sale, activation, renewal, support request, or other service where we reasonably believe that:

a. applicable sanctions may apply;
b. export-control or trade restrictions may apply;
c. the end user or intended use presents unacceptable legal or compliance risk; or
d. requested support or access could expose Exploit Pack VOF to legal or regulatory risk.

7. Risk-based review

Exploit Pack VOF applies a risk-based approach to customer review.

Transactions may receive increased scrutiny where factors include:

a. unclear or inconsistent customer identity information;
b. anonymous, disposable, or mismatched contact details;
c. suspicious or high-risk jurisdictions;
d. vague, evasive, or implausible use cases;
e. requests involving stealth, persistence, evasion, or deployment scenarios that raise misuse concerns;
f. requests to bypass licensing, attribution, or compliance safeguards;
g. reseller or third-party arrangements lacking transparency; or
h. prior abuse, fraud, chargeback, or compliance concerns.

8. Approval, refusal, and escalation

Exploit Pack VOF may approve, request more information, pause, refuse, suspend, or terminate a transaction or license where necessary to address compliance, abuse-prevention, fraud-prevention, sanctions, export-control, reputational, or legal risk.

We are not required to provide detailed reasons where doing so could undermine compliance, security, fraud prevention, or legal obligations.

9. Renewal screening

Because licenses are granted for a term of one (1) year from activation, customers may be re-screened at renewal or before renewal support, update access, reactivation, or continued commercial engagement.

Past approval does not guarantee future approval.

10. Support boundaries

Exploit Pack VOF may limit or refuse technical support, update access, or activation assistance where a request appears inconsistent with:

a. our End User License Agreement or Terms of Service;
b. this Policy;
c. applicable sanctions, export-control, or trade rules; or
d. lawful and authorised use requirements.

11. Delivery of licenses

Exploit Pack VOF supplies software licenses, digital downloads, updates, support, and related technical materials electronically. No physical goods are shipped unless expressly agreed in writing.

Delivery is deemed completed when a license key, activation, download link, account access, software package, or related delivery email has been sent to the customer’s provided contact details, or when access has otherwise been made available electronically.

Delivery times are estimates only unless expressly agreed otherwise in writing. Exploit Pack VOF may delay delivery, activation, renewal, or continued access where screening, compliance review, payment verification, fraud prevention, sanctions checks, export-control review, technical validation, or operational issues require additional time.

Customers are responsible for ensuring that the email address, contact details, system requirements, and receiving environment provided to Exploit Pack VOF are accurate and capable of receiving the product and related communications.

Exploit Pack VOF is not responsible for delivery delays or failures caused by incorrect customer information, email filtering, spam filtering, firewall restrictions, customer-side technical issues, third-party infrastructure, force majeure, payment holds, or compliance-related review.

Where a product has been delivered electronically, issued, accessed, or activated, it shall be treated as delivered for all contractual and refund purposes.

12. Recordkeeping

Exploit Pack VOF may retain records reasonably necessary to document customer screening, approvals, denials, sanctions checks, compliance declarations, license issuance, renewals, delivery, and abuse-prevention actions, subject to applicable data protection law and our Privacy Policy.

13. No guarantee of eligibility or delivery timing

Submission of customer information, payment, or a request for activation does not guarantee approval, delivery, support, renewal, or continued access.

Exploit Pack VOF reserves the right to decline, delay, or discontinue service where risk is unacceptable or cannot be adequately resolved.

14. Relationship to other policies

This Policy supplements, and does not replace, any applicable:

a. End User License Agreement / Terms of Service;
b. Privacy Policy;
c. Return and Refund Policy;
d. quotation, invoice, order form, or written commercial agreement.

15. Contact

For compliance, customer verification, legal, export-control, sanctions, abuse, shipping, delivery, or policy-related questions, contact:

Exploit Pack VOF
KvK number: 94579121
Email: support@exploitpack.com