• Devpost Devpost
    • Log in
    • Sign up
    Join a hackathon
    Devpost logo

    Devpost

    Participate in our public hackathons

    Hackathons Projects
    Devpost for Teams

    Devpost for Teams

    Access your company's private hackathons

    Login
    Host a hackathon
    Devpost

    Devpost

    Grow your developer ecosystem and promote your platform

    Host a public hackathon
    Devpost for Teams logo

    Devpost for Teams

    Drive innovation, collaboration, and retention within your organization

    Host an internal hackathon

    By use case

    AI hackathons Customer hackathons Employee hackathons Public hackathons
    Resources

    Blog

    Insights into hackathon planning and participation

    Customer stories

    Inspiration from peers and other industry leaders

    Planning guides

    Best practices for planning online and in-person hackathons

    Webinars & events

    Upcoming events and on-demand recordings

    Help desk

    Common questions and support documentation

  • Devpost Devpost
  • Join a hackathon
    • Devpost logo

      Devpost

      Participate in our public hackathons

      Hackathons Projects
      Devpost for Teams

      Devpost for Teams

      Access your company's private hackathons

      Login
  • Host a hackathon
    • Devpost

      Devpost

      Grow your developer ecosystem and promote your platform

      Host a public hackathon
      Devpost for Teams logo

      Devpost for Teams

      Drive innovation, collaboration, and retention within your organization

      Host an internal hackathon

      By use case

      AI hackathons Customer hackathons Employee hackathons Public hackathons
  • Resources
    • Blog

      Insights into hackathon planning and participation

      Customer stories

      Inspiration from peers and other industry leaders

      Planning guides

      Best practices for planning online and in-person hackathons

      Webinars & events

      Upcoming events and on-demand recordings

      Help desk

      Common questions and support documentation

  • Log in
  • Sign up

SANS AI Cybersecurity Hackathon

Descend
  • Overview
  • My projects
  • Participants (930)
  • Resources
  • Rules
  • Project gallery
  • Updates
  • Discussions
Connect with the participants – support your favorite projects by liking, sharing, and commenting on them.
Fukuro
Fukuro

Fukuro monitors, detects, and neutralizes cyber threats in real time.

Learner Muluh
2 0
Encryptify
Encryptify

Encryptify offers user-friendly AES and RSA encryption for seamless data protection, ensuring your messages remain confidential with an intuitive, cybersecurity-themed interface

Mudit Mahajan
1 0
PhishLock
PhishLock

Detect and analyze sophisticated phishing attempts with the power of AI. PhishLock AI combines behavioral analysis, URL checking, and AI language models for comprehensive protection.

3 1
Cyber Verse
Cyber Verse

CyberVerse is an AI-powered cybersecurity hub offering interactive labs, a smart chatbot, community resource sharing, phishing simulations, and cyber news to keep you secure.

Yashwanth Krishna
4 0
GitScan - AI Security Scanner for GitHub Repos
GitScan - AI Security Scanner for GitHub Repos

GitScan is an AI-powered tool that scans public GitHub repos for vulnerabilities, misconfigurations, and exposed secrets—giving developers instant, actionable security insights.

Gurneesh Budhiraja
0 0
CyberNexus Pi-Eye Q AI-powered agent for network security
CyberNexus Pi-Eye Q AI-powered agent for network security

CyberNexus Pi-Eye: AI-powered network security/Quantum-VPC for your local network. 🤖 Get real-time insights, analyze threats, & control Pi-hole defense - all with a cyberpunk agent."

Michael Inso
6 3
FirmTalks
FirmTalks

Unpack, analyze, and discuss firmware security. Firmtalks detects malware in hierarchical firmware structures while fostering collaborative, topic-driven discussions to safeguard embedded systems

Sunny Shaban Ali
0 0
TerraGuard
TerraGuard

TerraGuard: Because Your Cloud Shouldn’t Be an Open Bar for Hackers. 🍻

Lalit Yadav
1 0
AI-Powered Phishing Email Detector
AI-Powered Phishing Email Detector

A web-based tool that uses Natural Language Processing (NLP) techniques to analyze emails and determine their phishing risk. It evaluates content, sender reputation, and links to generate a risk score

Juan Rojas
0 0
Quantum Shield AI: Next-Gen Cryptographic Defense
Quantum Shield AI: Next-Gen Cryptographic Defense

AI-optimized post-quantum cryptography: Securing tomorrow's data against quantum threats today.

Aditya Srikar Konduri
87 5
CyberGraph Sentinel
CyberGraph Sentinel

Mapping the invisible paths hackers take, before they can take them.

Hung Truong
1 0
Yours, Truly
Yours, Truly

Your Digital Truth Companion. Use Cryptographic protocols to secure your data. Browse authentic moments and detect Al content with confidence. Celebrate genuine human creativity. Reclaim what's real.

Huda Hussaini Shams Ahson
1 0
illuminAIte - AI Powered Data Conversations
illuminAIte - AI Powered Data Conversations

Use AI agents to have an interactive data conversations with your local data files.

Jeff Bryner
0 0
Gap Analysis
Gap Analysis

An agent for cyber security teams to find gaps in their corporate anti-phising practices.

Francesco Vassalli Jeremy London
2 0
Scam Slayer AI
Scam Slayer AI

Scam Slayer is an AI-powered email threat detection model. The goal is to develop a fine-tuned BERT model that classify emails as phishing or non-phishing with high accuracy.

Moses Wanjema
1 0
CyberLearn
CyberLearn

CyberLearn is an interactive platform to teach people about cybersecurity

Mariam Ahmed Hussein
1 0
CyberSaga
CyberSaga

CyberSaga transforms cybersecurity education into an interactive journey, where AI-driven scenarios adapt to your role and industry, making complex security concepts engaging and practical.

Noor Ul Hassan Muhammad Abdullah
258 28
FraudShield Graph AI
FraudShield Graph AI

A graph-based fraud detection system for finance and e-commerce, leveraging ArangoDB, cuGraph, and GPT-4o to identify suspicious transaction patterns, detect anomalies, and prevent fraud in real time.

Jeremiah Ope
3 0
SnortML
SnortML

Automation of Snort using ML

0 0
Securo
Securo

Securo: One Click to Detect Phishing – AI-Powered Email Security for Everyone.

Arzuman Abbasov
2 0
Piaegis - Next Generation LLM powered SAST & DAST
Piaegis - Next Generation LLM powered SAST & DAST

Tired of chasing down critical security vulnerabilities late in the development cycle? Our intelligent platform automatically detects SANS Top 25 and emerging threats in your production line projects.

Akash Mondal shrestha singh
0 0
CodeBoomBoom
CodeBoomBoom

Based on a model that classifies vulnerabilities, we developed a system that uses AI to detect vulnerabilities in .C files uploaded to websites by users.

kanginseok 강 솔빈 박
2 0
AI-Powered Network Anomaly Detection System
AI-Powered Network Anomaly Detection System

This system is designed to help security teams identify suspicious activities efficiently, leveraging AI to improve threat detection and response in real-time.

Vaibhav Kumar
0 0
GoPhish
GoPhish

Empower your team against cyber threats—automate phishing simulations, track engagement, and strengthen security awareness effortlessly!

Tatenda Moyo Khawulela_ Dy Manqoba Nkosi cheese squad + 1
16 5

25 – 48 of 54

  • «
  • 1
  • 2
  • 3
  • »

Devpost

  • About
  • Careers
  • Contact
  • Help

Hackathons

  • Browse hackathons
  • Explore projects
  • Host a hackathon
  • Hackathon guides

Portfolio

  • Your projects
  • Your hackathons
  • Settings

Connect

  • Twitter
  • Discord
  • Facebook
  • LinkedIn
© 2026 Devpost, Inc. All rights reserved.
  • Community guidelines
  • Security
  • CA notice
  • Privacy policy
  • Terms of service