SecurAID securely connects aid organizations directly with individuals in dangerous situations to allow them to discreetly and effectively get the assistance they need.

Overview

SecurAID

Overview

SecurAID securely connects aid organizations directly with individuals in dangerous situations to allow them to discreetly and effectively get the assistance they need.

Trusted users, such as members of aid organizations or people working directly on the ground in a humanitarian crisis, have the ability to create secure logins for people they know in dangerous situations. Using these credentials, at-risk people are able to enter into a secure one-on-one internet chat with members from organizations that can best serve their needs.

Through our secure network of trusted organizations and users, SecurAID greatly minimizes the risk of at-risk individuals communicating with non-trustworthy or malicious sources, and also lowers the risk of them being identified by dangerous people or groups. SecurAID solves three key problems at once: eliminating duplicate information, identity verification, and streamlined resource allocation.

Background

Currently there are many disjointed groups of people helping Afghans that they know who are stuck in a dangerous condition. The efforts to help those in need come with many difficulties. Here's a real-world example to explain the problems encountered:

I've deployed to Afghanistan several times and became friends with my interpreters who had my back in combat. I'm now part of a slack group and a Signal chat group that both provide a place to share critical information and to try to allocate resources to our friends overseas. My ultimate goal is to get my interpreter's family out of Afghanistan, but in the meantime their daughter is suffering from kidney issues and the family is low on money. I've filled out numerous forms for visa paperwork, medical assistance, manifesting the family on future flights, and financial aid, but I have no idea what happens to that information once it's submitted, and very few ways to check the status of the requests. In addition, I've submitted forms only to find out another soldier who previously worked with my interpreter also filled out the same forms for his family. This causes extra work for aid workers to sift through duplicte entries. My Afghan family, along with many others, sometimes receive emails saying that they should go to a certain location at a certain time in order to receive help from American aid, however, many of those emails are traps sent by the Taliban to try to find American sympathizers. These families need a way to make sure that the messages they receive are actually coming from the correct sources.

   

How SecurAID works

SecurAID uses a centralized database to store and eliminate duplicate entries, saving valuable time and making it easy to ensure that a family receives the exact assistance they need. The database contains information about assistance type, allowing effective resource allocation by directing aid requests to the appropriate aid organizations. For instance, if a family needs insulin, their category in the database will be set to "medical needs," which will notify medical aid organizations who can access our database, and will ensure that only one organization is filling the request for aid.

To solve the issue of identity verification, the only people who will be able to add an Afghan family to the database will be someone invited into groups similar to the Slack and Signal chats discussed above. In order for a person to be invited to these chat groups, a person needs to be verified and vouched for by someone already in that group. This creates groups of trusted sources who personally know the Afghans they're trying to help. Once the Afghan account is created by the trusted member, that information is added to the database and the appropriate organization is notified of a person to assist overseas. A person at that organization gets assigned to the Afghan in need, allowing them to update the at-risk individual's database entry as more information about their situation comes in. (Individual entries will be read-only for all others who can access the database and are not actively assisting that individual.) From there, the assigned organization contact will send a link to the Afghan family with a link to a secure one-on-one chat room through SecurAID. Whenever important information is sent, it will be sent through the chat room, which means any other forms of communication received through email, text, etc. can be assumed to be nefarious and can be ignored. No one will have access to the unique chatroom except the organization contact and the person receiving assistance. If an overseas ally needs more than one thing (e.g. legal help for passports and heart medication), they will receive multiple links, one from a different contact at each relevant aid organization (e.g. link fomr a legal office, and one from a medical office). At the same time, the trusted source who created the account can see the status of the request and can inform his/her friend of any updates.

Owner
Ty K
Ty K
Seamless deployment and management of cybersecurity solutions 🏗️

Description 🖼️ Background 👴🏼 Vision 📜 Concepts 💬 Solutions' Lifecycle. Operations ⭕ Functionalities 🚀 Supported Cybersecurity Solutions 📦 Insta

MutableSecurity 36 Nov 10, 2022
CVE-2021-44228 log4j 2.x rce漏洞检测工具

#1 使用说明 CVE-2021-44228 log4j 2.x rce漏洞检测工具,对目标链接发起get请求并利用dnslog探测是否有回显 $ python3 log4j-scan.py -h

CoCo ainrm- 4 Jan 13, 2022
A brute Force tool for Facebook

EliBruter A brute Force tool for Facebook Installing this tool -- $ pkg upgrade && update $ pkg install python $ pkg install python3 $ pkg install gi

Eli Hacks 3 Mar 29, 2022
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user

About Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user Changed from sam-the-admin. Usage SAM THE ADMIN CVE-202

Evi1cg 500 Jan 06, 2023
CTF framework and exploit development library

pwntools - CTF toolkit Pwntools is a CTF framework and exploit development library. Written in Python, it is designed for rapid prototyping and develo

Gallopsled 9.8k Dec 31, 2022
HTTP security headers for Flask

Talisman: HTTP security headers for Flask Talisman is a small Flask extension that handles setting HTTP headers that can help protect against a few co

Google Cloud Platform 854 Dec 30, 2022
Client script for the fisherman phishing tool

Client script for the fisherman phishing tool

Pushkar Raj 1 Feb 23, 2022
OLOP: One-Line & Obfuscated Python

OLOP: One-Line & Obfuscated Python This repository contains useful python modules for one-line and obfuscated python. pip install olop-ShadowLugia650

1 Jan 09, 2022
Malware for Discord, designed to steal passwords, tokens, and inject discord folders for long-term use.

Vital What is Vital? Vital is malware primarily used to collect and extract information from the Discord desktop client. While it has other features (

HellSec 59 Dec 01, 2022
🎻 Modularized exploit generation framework

Modularized exploit generation framework for x86_64 binaries Overview This project is still at early stage of development, so you might want to come b

ᴀᴇꜱᴏᴘʜᴏʀ 30 Jan 17, 2022
MTBLLS Ethical Hacking Tool Announcement of v2.0

MTBLLS Ethical Hacking Tool Announcement of v2.0 MTBLLS is a Free and Open-Source Ethical Hacking Tool developed by GhostTD (SkyWtkh) The tool can onl

Ghost 2 Mar 19, 2022
Add a Web Server based on Rogue Mysql Server to allow remote user get

介绍 对于需要使用 Rogue Mysql Server 的漏洞来说,若想批量检测这种漏洞的话需要自备一个服务器。并且我常用的Rogue Mysql Server 脚本 不支持动态更改读取文件名、不支持远程用户访问读取结果、不支持批量化检测网站。于是乎萌生了这个小脚本的想法 Rogue-MySql-

6 May 17, 2022
CVE-2022-22965 : about spring core rce

CVE-2022-22965: Spring-Core-Rce EXP 特性: 漏洞探测(不写入 webshell,简单字符串输出) 自定义写入 webshell 文件名称及路径 不会追加写入到同一文件中,每次检测写入到不同名称 webshell 文件 支持写入 冰蝎 webshell 代理支持,可

东方有鱼名为咸 53 Nov 09, 2022
A python script to bypass 403-forbidden.

4nought3 A python script to bypass 403-forbidden. It covers methods like Host-Header Injections, Changing HTTP Requests Methods and URL-Injections. Us

11 Aug 27, 2022
Dumping revelant information on compromised targets without AV detection

DonPAPI Dumping revelant information on compromised targets without AV detection DPAPI dumping Lots of credentials are protected by DPAPI (link ) We a

Login Securite 580 Jan 09, 2023
Auto Tor Ip Changer

AutoTor Auto Tor Ip Changer for Linux! git clone https://github.com/Arest7/AutoTor cd AutoTor pip install -r requirements.txt python3 AutoTor.py follo

Ken Ryuguji 3 Jan 23, 2022
Cisco RV110w UPnP stack overflow

Cisco RV110W UPnP 0day 分析 前言 最近UPnP比较火,恰好手里有一台Cisco RV110W,在2021年8月份思科官方公布了一个Cisco RV系列关于UPnP的0day,但是具体的细节并没有公布出来。于是想要用手中的设备调试挖掘一下这个漏洞,漏洞的公告可以在官网看到。 准

badmonkey 25 Nov 09, 2022
This script checks for any possible SSRF dns/http interactions in xmlrpc.php pingback feature

rpckiller This script checks for any possible SSRF dns/http interactions in xmlrpc.php pingback feature and with that you can further try to escalate

Ashish Kunwar 33 Sep 23, 2022
Separate handling of protected media in Django, with X-Sendfile support

Django Protected Media Django Protected Media is a Django app that manages media that are considered sensitive in a protected fashion. Not only does t

Cobus Carstens 46 Nov 12, 2022
Web3 Pancakeswap Sniper & honeypot detector Take Profit/StopLose bot written in python3, For ANDROID WIN MAC & LINUX

🏆 Pancakeswap BSC Sniper Bot web3 with honeypot detector (ANDROID WINDOWS MAC LINUX) 🥇 ⭐️ ⭐️ ⭐️ First SNIPER BOT for ANDROID & WINDOWS with honeypot

Mayank 12 Jan 07, 2023