Devpost
Participate in our public hackathons
Devpost for Teams
Access your company's private hackathons
Grow your developer ecosystem and promote your platform
Drive innovation, collaboration, and retention within your organization
By use case
Blog
Insights into hackathon planning and participation
Customer stories
Inspiration from peers and other industry leaders
Planning guides
Best practices for planning online and in-person hackathons
Webinars & events
Upcoming events and on-demand recordings
Help desk
Common questions and support documentation
A birds-eye of the web
Your Digital Guardian Against Web Vulnerabilities
ICSMalDetect uses machine learning via ARIMA models for ICS administrators to detect malware based on anomalies in their sensor readings.
A cybersecurity system that will identify vulnerabilities in the user's system, patch them, and list them out to the user.
Secure. Simple. Emoji-powered.
Redefining Authentication.
Cybersecurity Software - Submission for CTC 2025
Using a trained AI Model to detect malware riddled PE Files within individual and directory files.
A web extension that watches your back.
Uses NFC technology and Fingerprinting to authenticate the applications that need the highest amount of security.
Transforming authentication with quantum-driven biometric security!
This chrome extension allows a user to check a block of code in multiple languages such as PHP, Python, Java, and Javascript. It also includes a password generator tool.
The Botnet Detection Tool leverages AI and machine learning to detect and alert users about potential botnet activity in real-time, helping secure networks from evolving cyber threats.
Every website asks you for a username and password, but it's well known that passwords are often the weakest link in an authentication system. What if a signup flow focused on more secure methods?
SNET: A Chrome extension blocking phishing attacks with LLM and instant link detection. Plus, an API lookup tool for parents to verify online identities and protect children from predators.
Next-Gen Authentication: Redefining Security with Simplicity, Scalability
1 – 16 of 16