We’ve expanded our partnership with Mandiant, now part of Google Cloud, to help our users operationalize and prioritize threat intelligence. READ THE PRESS RELEASE >


Acceptable Use Policy

Effective Date: October 14, 2022

By accessing or using the Application or the Services, you agree to abide by the terms of this Acceptable Use Policy and Threatology End User License Agreement. All capitalized terms used but not defined herein shall have the meanings set forth in Threatology End User License Agreement.

Restricted Use

You shall not, or permit any person or entity, to:

  1. alter, modify, or make derivative works of the Application;
  2. reverse engineer, reverse assemble or decompile, or otherwise attempt to derive source code, ideas, algorithms or structure underlying any of the Applications or Services or any portion thereof;
  3. use any robot, spider, crawlers, deep-link, automated content scraping script, grabbers or other automatic device, program, techniques, algorithm or methodology to retrieve, index, scrape, data mine or in any way gather, copy or monitor any portion of the Applications, the Services or any content thereof;
  4. deploy or use the Application or Services on more computers or to more users than the number of licenses allocated to you in accordance with the Order Form;
  5. install, access, or use, or allow the installation, accessing, or use of, the Application for any unfair or deceptive practices or in contravention of any federal, state, local, foreign, or other applicable laws, or rules and regulations of regulatory or administrative organizations;
  6. act in a fraudulent, tortious malicious, or negligent manner when using the Application;
  7. rent, sell, license, or remarket the Application or provide access to the Application to any Third Party;
  8. create any Incident in the Application or upon any server used in connection with the Application or introduce or implement any other code or routine which results in disruption or damage to the Application;
  9. store, transmit, post or utilize inappropriate, violent, nude, sexually suggestive, discriminatory, offensive, infringing, libelous, or other unlawful materials in violation of any third party privacy rights when using the Application;
  10. use the Application or Service to analyze samples related to pornographic, obscene, nude, graphically violent, and other inappropriate content; or
  11. resell, transfer, rent, distribute, or otherwise make the Subscription, Subscription Content, Threatology Materials, or any results thereof available in whole or in part to any Third Party, your Affiliate, or other division or subdivision except as expressly authorized in the Order Form. You are responsible for all acts and omissions of your Application users.

Permitted Use

Subject to the use restrictions above, you may use Malware, Attacks, hack tools, adversary techniques as permitted on designed attacker or victim machines for the sole purpose of creating and cataloging your own library of Threat Information.

Community Content or Customer Content may be posted, shared, or disseminated outside the Application, provided that:

  1. A reference is made back to SnapAttack as the source of the Content, to include the full URL of the Content item in the Application;
  2. The original author is credited, and;
  3. Any other applicable licenses and restrictions are followed, which will be included in the license field for the Content.

Customer Content

You represent and warrant that you:

  1. have made all necessary disclosures, obtained all necessary consents and government authorizations required under applicable law (including DMCA as set forth in the DMCA Compliance provision hereunder) to permit the processing and international transfer of Customer Content (including any personal data of users), to us,
  2. will not knowingly submit any Customer Content that contains confidential or commercially sensitive data or personal data of any Third Party without lawful permission, and
  3. have the ownership or rights in Customer Content to irrevocably contribute such Customer Content to us, and that we do not assume responsibility for and may rely, without independent verification, on the accuracy and completeness of any such Customer Content.

DMCA Compliance

We have a policy of removing user submissions that violate intellectual property rights of others, suspending access to the Applications (or any portion thereof) to any user who uses the Applications in violation of any third party’s intellectual property rights, and/or terminating in appropriate circumstances the account of any user who uses the Application in violation of any third party’s intellectual property rights.

Pursuant to Title 17 of the United States Code, Section 512, we have implemented procedures for receiving written notification of claimed copyright infringement and for processing such claims in accordance with such law. If you believe your copyright or other intellectual property right is being infringed by a user of this website, please provide written notice to our agent (“Agent”) for notice of claims of infringement:


Attention: Copyright Manager (DMCA Agent)
Threatology, Inc.

4075 Wilson Blvd.
Floor 8
Arlington, VA 22203

E-mail: legal@snapattack.com


To be sure the matter is handled immediately, your written notice must:

  1. Contain your physical or electronic signature;
  2. Identify the copyrighted work or other intellectual property alleged to have been infringed;
  3. Identify the allegedly infringing material in a sufficiently precise manner to allow Us to locate that material;
  4. Contain adequate information by which we can contact you (including postal address, telephone number, and e-mail address);
  5. Contain a statement that you have a good faith belief that use of the copyrighted material or other intellectual property is not authorized by the owner, the owner’s agent or the law;
  6. Contain a statement that the information in the written notice is accurate; and
  7. Contain statement, under penalty of perjury, that you are authorized to act on behalf of the copyright or other intellectual property right owner.

Unless the notice pertains to copyright or other intellectual property infringement, the Agent will be unable to address the listed concern.

Submitting a DMCA Counter-Notification

We will notify you that we have removed or disabled access to copyright-protected material that you provided, if such removal is pursuant to a validly received DMCA take-down notice. In response, you may provide our Agent with a written counter-notification that includes the following information:

  1. your physical or electronic signature;
  2. Identification of the material that has been removed or to which access has been disabled, and the location at which the material appeared before it was removed or access to it was disabled;
  3. A statement from you under the penalty of perjury, that you have a good faith belief that the material was removed or disabled as a result of a mistake or misidentification of the material to be removed or disabled; and
  4. your name, physical address and telephone number, and a statement that you consent to the jurisdiction of a court for the judicial district in which your physical address is located, or if your physical address is outside of the United States, for any judicial district in which we may be located, and that you will accept service of process from the person who provided notification of allegedly infringing material or an agent of such person.

Termination of Repeat Infringers

We reserve the right, in our sole discretion, to terminate the account or access of any user of the Application or Service who is the subject of repeated DMCA or other infringement notifications.