Devpost
Participate in our public hackathons
Devpost for Teams
Access your company's private hackathons
Grow your developer ecosystem and promote your platform
Drive innovation, collaboration, and retention within your organization
By use case
Blog
Insights into hackathon planning and participation
Customer stories
Inspiration from peers and other industry leaders
Planning guides
Best practices for planning online and in-person hackathons
Webinars & events
Upcoming events and on-demand recordings
Help desk
Common questions and support documentation
A cutting-edge steganography tool for securing messages and communications using a unique binary to LSB-bit methodology, that goes undetected from common analysis tools
A simple hardware key using an ESP32
"Kevyn: Your Safe Caller Ally!"
Cyber Protect is a game to help users get familiar with cybersecurity and have fun. Users will learn IoT concepts, cybersecurity terms, and many other types of attacks.
Your AI-powered email guard. Scan incoming emails for potential scams with personalized risk assessments. A reliable friend in your inbox, making your digital communication safer and worry-free.
Use machine learning, URL analysis, and user behavior monitoring to detect phishing sites. Scan URLs for suspicious patterns, cross-check with blacklists, and educate users to enhance online security.
Our scam checker will detect scams and malicious content in all of your emails. It can be scaled up to be implemented in popular email, text, and other messaging platforms.
Sweat Together uses advanced AI algorithms to provide users with feedback on their workouts.
PhishNet is a centralized contact screening platform created to stop phishing attacks in their tracks
Your pal for a better world.
Defend the Base, Conquer the Aliens - WIMS: A Thrilling Alien Planet Survival Game!
♾️The Best Study Together Platform♾️
Revolutionize learning with SocracticCyberScholars: AI-powered study groups for an interactive, thought-provoking educational journey.
BugStrike aims to improve detection efficiency and enhance security because these contracts are susceptible to vulnerabilities, which can result in financial losses and security breaches.
Unlocking Security: Where Every Code is a Fortress, and Every Key is a Guardian.
A tool to remove exifdata from images. It deletes all the extra details stored in the photo.
How can you test your employees ability to fight back against social engineering? Use my tool, the Hook Line and Sinker. It generates a phishing email, and then educates them about the danger of this.
Artistic Learning through AI Image Generation (Upcycled from a Previous Endeavor)
Cyber Security Education AND Phish Authenticator WEBSITE and APP.
ZenScape AR: Transform any space into a serene sanctuary for mindfulness, peace, and immersive relaxation, anytime, anywhere. Your oasis in augmented reality.
AI Tutor for all-nighters
A Chrome extension that will read webpage text, find email addresses, and use ZeroBounce API to determine its validity. This is a helpful tool that will quickly determine what is a real email.
NeuraWallet: Revolutionizing cybersecurity with adaptive biometrics, real-time user behavioral detection, and intuitive financial/business management – redefining AI for a secure digital future.
1 – 23 of 23