Skip to content

cyberlawaltech/AlertMeServer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🕵️‍♂️ AlertMe C2: Adversary Emulation & FinTech Security Lab 🕵️‍♂️

Red Team Socket.io Active Research

☣️ Application Description: Red Team Perspective

The AlertMe Server is a centralized Command & Control (C2) Orchestration Platform engineered to simulate sophisticated Financial Fraud (FF) attack vectors.

From an ethical hacker’s perspective, this server facilitates the study of Red Team Adversary Emulation. It manages real-time socket connections to banking PWAs to explore the efficacy of Smishing (SMS Phishing), Social Engineering (SE), and Data Exfiltration techniques. By leveraging WebSockets, the server enables researchers to intercept client-side sessions, trigger mock "Fake Alert" payloads, and analyze how users interact with deceptive banking interfaces under simulated high-pressure scenarios.

🛠️ System Specifications

Layer Technology Stack Tactical Utility
Runtime Node.js (v18+) High-performance asynchronous execution.
Framework Express.js 5.2.1 API endpoint management for health & payloads.
Real-time C2 Socket.io Bidirectional C2 channel for data exfiltration.
Messaging Twilio SDK Smishing & SMS Gateway trigger simulation.
Persistence LocalStorage / Hooks Client-state tracking via account numbers.

🚀 Local Installation (Security Lab Setup)

Follow these steps to deploy the C2 server in your local research environment:

1️⃣ Prepare the Environment code Bash download content_copy expand_less git clone https://github.com/cyberlawal/alertme-c2-server.git cd alertme-c2-server 2️⃣ Configuration (Secrets Management)

Create a .env.local file to store your simulated attack credentials:

code Env download content_copy expand_less NEXT_PUBLIC_REMOTE_SERVER_URL=http://localhost:3001 CLIENT_URL=http://localhost:3000 TWILIO_ACCOUNT_SID=AC_RESEARCH_HASH TWILIO_AUTH_TOKEN=TOKEN_HASH 3️⃣ Launch the Orchestrator code Bash download content_copy expand_less npm install npm run server

Server active at http://localhost:3001 | Health check: /health

🗺️ Offensive Security Roadmap Phase Milestone Research Goal P0 Socket Encryption Hardening C2 channels against interception. P1 Payload Randomization Evading automated fraud detection patterns. P2 Session Hijacking Simulating token theft and account takeover (ATO). P3 Global CDN Proxy Testing latency in cross-border C2 orchestration. 👤 Author & Researcher: Oluwaseun Lawal

Cybersecurity Researcher | Red Team Specialist Pioneering research into FinTech vulnerabilities and human-centric attack vectors.

⚖️ CRITICAL LEGAL NOTICE

🛑 EDUCATIONAL USE ONLY 🛑

This server and its associated client applications are developed strictly for Authorized Penetration Testing, Vulnerability Research, and Security Education. The use of "Fake Alert" simulations to defraud individuals or systems without explicit legal authorization is a criminal offense. The author, Oluwaseun Lawal, provides this tool for defense-oriented research only. Use responsibly and legally.

Simulating the threat to build the shield.
© 2026 AlertMe Cyber Research Labs

About

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •