appwisp
  • App explorer
  • SDKs insights
  • API
  • Contact
  • About
  • API
  • Github
© 2025 appwisp.com

Türk Kızılay Mobil

tr.org.kizilay.mobilbagis

Total installs
229.6K(229,673)
Rating
3.3(3 reviews)
Released
May 24, 2018
Last updated
October 13, 2025
Category
Social
Developer
Türk Kızılay Derneği
Developer details

Name
Türk Kızılay Derneği
E-mail
[email protected]
Website
unknown
Country
unknown
Address
unknown
Android SDKs

  • Android SDK
  • Google Firebase
Türk Kızılay Mobil Header - AppWisp.com

Screenshots

Türk Kızılay Mobil Screenshot 1 - AppWisp.com
Türk Kızılay Mobil Screenshot 2 - AppWisp.com
Türk Kızılay Mobil Screenshot 3 - AppWisp.com
Türk Kızılay Mobil Screenshot 4 - AppWisp.com

Description

Since its founding, the Red Crescent has reached millions of people through its humanitarian aid activities, drawing strength from its donors. You can support the Red Crescent's work by donating to its humanitarian aid activities.

WHAT'S IN THE RED CRESCENT MOBILE APP?

With easy navigation, you can easily find the content you're looking for.

You can easily make in-kind, cash, and real estate donations by category.

You can track your donations by logging into your account within the app.

You can find the nearest Red Crescent branch and easily access their contact information.

All keywords for SMS donations are now at your fingertips. You can easily make a one-time or regular SMS donation.

You can tell us about any feature you'd like to see added to the app and guide us on any issues you'd like to see improved.

Spreading kindness is as important as doing good. You can share our Red Crescent donation app with those around you and invite them to do good.

You can access our reports on all our humanitarian aid activities.

You can participate in any campaign you choose and easily make your donation whenever you want.

You can closely follow the activities of the Red Crescent.

SECURE DONATIONS AND HIGH PAYMENT SECURITY

Our institution protects data belonging to individuals and legal entities during transmission, storage, and processing with security protocols that comply with industry standards.