Skip to content

cyberlawaltech/AlertMeClient

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Ā 

History

52 Commits
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 

Repository files navigation

šŸ’» AlertMe: FinTech Security & Social Engineering Research Lab šŸ”

Phase Research Stack

šŸ› ļø Research Objective: Attack Surface Analysis

AlertMe (Ecobank Express Lite) is a high-fidelity Red Team simulation platform engineered to investigate the technical and psychological vulnerabilities in modern mobile banking ecosystems.

From an ethical hacker’s perspective, this application serves as a controlled environment to study Client-Side Trust Exploitation. It replicates the UI/UX of a legitimate banking PWA to demonstrate how "Fake Alert" vectors—leveraging SMS API integration and local data manipulation—can be utilized in sophisticated Social Engineering campaigns to bypass user skepticism and security awareness protocols.

šŸ“Š Technical Specifications Vector Implementation Vulnerability Focus UX Spoofing Next.js 15.2 & Radix UI Human-Computer Interaction (HCI) Trust Payload Delivery Twilio SMS Gateway SMS Spoofing & Phishing (Smishing) Data Persistence LocalStorage/IndexedDB Client-side sensitive data exposure Network Layer Edge API Routes Interception and Mock-Response manipulation Offline Mode Service Workers Persistence in isolated/unreliable environments šŸš€ Deployment for Research (Local Setup)

Auditing the platform requires a localized environment to simulate attack vectors:

1ļøāƒ£ Clone the Laboratory code Bash download content_copy expand_less git clone https://github.com/your-username/alertme-research.git cd alertme-research 2ļøāƒ£ Configure Attack Vectors (API Setup)

Populate your .env.local with your SMS gateway credentials to enable "Fake Alert" triggers:

code Env download content_copy expand_less TWILIO_ACCOUNT_SID=AC_RESEARCH_SID TWILIO_AUTH_TOKEN=AUTH_TOKEN_HASH TWILIO_PHONE_NUMBER=SPOOFED_SENDER_ID 3ļøāƒ£ Initialize the Environment code Bash download content_copy expand_less npm install && npm run dev

Target Environment: http://localhost:3000

šŸ—ŗļø Cybersecurity Research Roadmap Phase Milestone Objective Phase I SMS Spoofing Integration Researching message sender-ID trust factors Phase II Credential Harvesting Simulation Analyzing user input patterns in mock login layers Phase III Deep Link Injection Exploring PWA entry-point vulnerabilities Phase IV Biometric Bypass Mock Demonstrating UI-level biometric deception šŸ‘¤ Cybersecurity Researcher: Oluwaseun Lawal

Identity & Access Management Specialist | Red Team Enthusiast Focused on identifying the "Human-in-the-Middle" (HITM) vulnerabilities in FinTech.

āš ļø CRITICAL DISCLAIMER

šŸ›‘ EDUCATIONAL USE ONLY šŸ›‘

This application is strictly for vulnerability research, security awareness, and authorized ethical hacking simulations. Unauthorized use of this tool for fraudulent activities, including "fake alerts" to deceive individuals or financial institutions, is illegal and punishable by law. The author, Oluwaseun Lawal, assumes no liability for misuse of this research platform.

Simulating threats to build a more secure digital future.
Ā© 2026 CyberLawal Security Lab.

About

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 8