Skip to content

cyberlawaltech/AlertMeClient

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

52 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

💻 AlertMe: FinTech Security & Social Engineering Research Lab 🔍

Phase Research Stack

🛠️ Research Objective: Attack Surface Analysis

AlertMe (Ecobank Express Lite) is a high-fidelity Red Team simulation platform engineered to investigate the technical and psychological vulnerabilities in modern mobile banking ecosystems.

From an ethical hacker’s perspective, this application serves as a controlled environment to study Client-Side Trust Exploitation. It replicates the UI/UX of a legitimate banking PWA to demonstrate how "Fake Alert" vectors—leveraging SMS API integration and local data manipulation—can be utilized in sophisticated Social Engineering campaigns to bypass user skepticism and security awareness protocols.

📊 Technical Specifications Vector Implementation Vulnerability Focus UX Spoofing Next.js 15.2 & Radix UI Human-Computer Interaction (HCI) Trust Payload Delivery Twilio SMS Gateway SMS Spoofing & Phishing (Smishing) Data Persistence LocalStorage/IndexedDB Client-side sensitive data exposure Network Layer Edge API Routes Interception and Mock-Response manipulation Offline Mode Service Workers Persistence in isolated/unreliable environments 🚀 Deployment for Research (Local Setup)

Auditing the platform requires a localized environment to simulate attack vectors:

1️⃣ Clone the Laboratory code Bash download content_copy expand_less git clone https://github.com/your-username/alertme-research.git cd alertme-research 2️⃣ Configure Attack Vectors (API Setup)

Populate your .env.local with your SMS gateway credentials to enable "Fake Alert" triggers:

code Env download content_copy expand_less TWILIO_ACCOUNT_SID=AC_RESEARCH_SID TWILIO_AUTH_TOKEN=AUTH_TOKEN_HASH TWILIO_PHONE_NUMBER=SPOOFED_SENDER_ID 3️⃣ Initialize the Environment code Bash download content_copy expand_less npm install && npm run dev

Target Environment: http://localhost:3000

🗺️ Cybersecurity Research Roadmap Phase Milestone Objective Phase I SMS Spoofing Integration Researching message sender-ID trust factors Phase II Credential Harvesting Simulation Analyzing user input patterns in mock login layers Phase III Deep Link Injection Exploring PWA entry-point vulnerabilities Phase IV Biometric Bypass Mock Demonstrating UI-level biometric deception 👤 Cybersecurity Researcher: Oluwaseun Lawal

Identity & Access Management Specialist | Red Team Enthusiast Focused on identifying the "Human-in-the-Middle" (HITM) vulnerabilities in FinTech.

⚠️ CRITICAL DISCLAIMER

🛑 EDUCATIONAL USE ONLY 🛑

This application is strictly for vulnerability research, security awareness, and authorized ethical hacking simulations. Unauthorized use of this tool for fraudulent activities, including "fake alerts" to deceive individuals or financial institutions, is illegal and punishable by law. The author, Oluwaseun Lawal, assumes no liability for misuse of this research platform.

Simulating threats to build a more secure digital future.
© 2026 CyberLawal Security Lab.

About

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 8