SecurAID securely connects aid organizations directly with individuals in dangerous situations to allow them to discreetly and effectively get the assistance they need.

Overview

SecurAID

Overview

SecurAID securely connects aid organizations directly with individuals in dangerous situations to allow them to discreetly and effectively get the assistance they need.

Trusted users, such as members of aid organizations or people working directly on the ground in a humanitarian crisis, have the ability to create secure logins for people they know in dangerous situations. Using these credentials, at-risk people are able to enter into a secure one-on-one internet chat with members from organizations that can best serve their needs.

Through our secure network of trusted organizations and users, SecurAID greatly minimizes the risk of at-risk individuals communicating with non-trustworthy or malicious sources, and also lowers the risk of them being identified by dangerous people or groups. SecurAID solves three key problems at once: eliminating duplicate information, identity verification, and streamlined resource allocation.

Background

Currently there are many disjointed groups of people helping Afghans that they know who are stuck in a dangerous condition. The efforts to help those in need come with many difficulties. Here's a real-world example to explain the problems encountered:

I've deployed to Afghanistan several times and became friends with my interpreters who had my back in combat. I'm now part of a slack group and a Signal chat group that both provide a place to share critical information and to try to allocate resources to our friends overseas. My ultimate goal is to get my interpreter's family out of Afghanistan, but in the meantime their daughter is suffering from kidney issues and the family is low on money. I've filled out numerous forms for visa paperwork, medical assistance, manifesting the family on future flights, and financial aid, but I have no idea what happens to that information once it's submitted, and very few ways to check the status of the requests. In addition, I've submitted forms only to find out another soldier who previously worked with my interpreter also filled out the same forms for his family. This causes extra work for aid workers to sift through duplicte entries. My Afghan family, along with many others, sometimes receive emails saying that they should go to a certain location at a certain time in order to receive help from American aid, however, many of those emails are traps sent by the Taliban to try to find American sympathizers. These families need a way to make sure that the messages they receive are actually coming from the correct sources.

   

How SecurAID works

SecurAID uses a centralized database to store and eliminate duplicate entries, saving valuable time and making it easy to ensure that a family receives the exact assistance they need. The database contains information about assistance type, allowing effective resource allocation by directing aid requests to the appropriate aid organizations. For instance, if a family needs insulin, their category in the database will be set to "medical needs," which will notify medical aid organizations who can access our database, and will ensure that only one organization is filling the request for aid.

To solve the issue of identity verification, the only people who will be able to add an Afghan family to the database will be someone invited into groups similar to the Slack and Signal chats discussed above. In order for a person to be invited to these chat groups, a person needs to be verified and vouched for by someone already in that group. This creates groups of trusted sources who personally know the Afghans they're trying to help. Once the Afghan account is created by the trusted member, that information is added to the database and the appropriate organization is notified of a person to assist overseas. A person at that organization gets assigned to the Afghan in need, allowing them to update the at-risk individual's database entry as more information about their situation comes in. (Individual entries will be read-only for all others who can access the database and are not actively assisting that individual.) From there, the assigned organization contact will send a link to the Afghan family with a link to a secure one-on-one chat room through SecurAID. Whenever important information is sent, it will be sent through the chat room, which means any other forms of communication received through email, text, etc. can be assumed to be nefarious and can be ignored. No one will have access to the unique chatroom except the organization contact and the person receiving assistance. If an overseas ally needs more than one thing (e.g. legal help for passports and heart medication), they will receive multiple links, one from a different contact at each relevant aid organization (e.g. link fomr a legal office, and one from a medical office). At the same time, the trusted source who created the account can see the status of the request and can inform his/her friend of any updates.

Owner
Ty K
Ty K
Instagram brute force tool that uses tor as its proxy connections

Insta-crack This is a instagram brute force tool that uses tor as its proxy connections, keep in mind that you should not do anything illegal with thi

Liam 3 Jan 28, 2022
DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)

dnspooq DNSpooq PoC - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685) For educational purposes only Requirements Docker compo

Teppei Fukuda 80 Nov 28, 2022
BloodyAD is an Active Directory Privilege Escalation Framework

BloodyAD Framework BloodyAD is an Active Directory Privilege Escalation Framework, it can be used manually using bloodyAD.py or automatically by combi

757 Jan 07, 2023
Visius Heimdall is a tool that checks for risks on your cloud infrastructure

Heimdall Cloud Checker 🇧🇷 About Visius is a Brazilian cybersecurity startup that follows the signs of the crimson thunder ;) 🎸 ! As we value open s

visius 48 Jun 20, 2022
Extensive Python3 network scanner, simplified.

Snake Map Extensive Python3 network scanner, simplified. _,.--. --..,_ .'`__ o `;__, `'.'. .'.'` '---'` '

Miss Bliss 4 Apr 16, 2022
Learning to compose soft prompts for compositional zero-shot learning.

Compositional Soft Prompting (CSP) Compositional soft prompting (CSP), a parameter-efficient learning technique to improve the zero-shot compositional

Bats Research 32 Jan 02, 2023
CVE-2022-22963 PoC

CVE-2022-22963 CVE-2022-22963 PoC Slight modified for English translation and detection of https://github.com/chaosec2021/Spring-cloud-function-SpEL-R

Nicolas Krassas 104 Dec 08, 2022
CVE-2021-45232-RCE-多线程批量漏洞检测

CVE-2021-45232-RCE CVE-2021-45232-RCE-多线程批量漏洞检测 FOFA 查询 title="Apache APISIX Das

孤桜懶契 36 Sep 21, 2022
Open source vulnerability DB and triage service.

OSV - Open Source Vulnerabilities OSV is a vulnerability database and triage infrastructure for open source projects aimed at helping both open source

Google 893 Jan 04, 2023
ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)

ProxyShell Install git clone https://github.com/ktecv2000/ProxyShell cd ProxyShell virtualenv -p $(which python3) venv source venv/bin/activate pip3 i

Poming huang 312 Dec 09, 2022
A Python r2pipe script to automatically create a Frida hook to intercept TLS traffic for Flutter based apps

boring-flutter A Python r2pipe script to automatically create a Frida hook to intercept TLS traffic for Flutter based apps. Currently only supporting

Hamza 64 Oct 18, 2022
CVE-2022-23046 - SQL Injection Vulnerability on PhpIPAM v1.4.4

CVE-2022-23046 PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL s

2 Feb 15, 2022
Official repository for Pyew.

pyew Pyew is a (command line) python tool to analyse malware. It does have support for hexadecimal viewing, disassembly (Intel 16, 32 and 64 bits), PE

Joxean 362 Nov 28, 2022
An ARP Spoofer attacker for windows to block away devices from your network.

arp0_attacker An ARP Spoofer-attacker for Windows -OS to block away devices from your network. INFO Built in Python 3.8.2. arp0_attackerx.py is Upgrad

Wh0_ 15 Mar 17, 2022
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python

Pupy Installation Installation instructions are on the wiki, in addition to all other documentation. For maximum compatibility, it is recommended to u

7.4k Jan 04, 2023
Vulnerability Exploitation Code Collection Repository

Introduction expbox is an exploit code collection repository List CVE-2021-41349 Exchange XSS PoC = Exchange 2013 update 23 = Exchange 2016 update 2

0x0021h 263 Feb 14, 2022
A forensic collection tool written in Python.

CHIRP A forensic collection tool written in Python. Watch the video overview 📝 Table of Contents 📝 Table of Contents 🧐 About 🏁 Getting Started Pre

Cybersecurity and Infrastructure Security Agency 1k Dec 09, 2022
labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface

labsecurity labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface. Warning

Dylan Meca 16 Dec 08, 2022
HashDB API hash lookup plugin for IDA Pro

HashDB IDA Plugin Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service. Adding New Hash Algorithms

OALabs 237 Dec 21, 2022