• Devpost Devpost
    • Log in
    • Sign up
    Join a hackathon
    Devpost logo

    Devpost

    Participate in our public hackathons

    Hackathons Projects
    Devpost for Teams

    Devpost for Teams

    Access your company's private hackathons

    Login
    Host a hackathon
    Devpost

    Devpost

    Grow your developer ecosystem and promote your platform

    Host a public hackathon
    Devpost for Teams logo

    Devpost for Teams

    Drive innovation, collaboration, and retention within your organization

    Host an internal hackathon

    By use case

    AI hackathons Customer hackathons Employee hackathons Public hackathons
    Resources

    Blog

    Insights into hackathon planning and participation

    Customer stories

    Inspiration from peers and other industry leaders

    Planning guides

    Best practices for planning online and in-person hackathons

    Webinars & events

    Upcoming events and on-demand recordings

    Help desk

    Common questions and support documentation

  • Devpost Devpost
  • Join a hackathon
    • Devpost logo

      Devpost

      Participate in our public hackathons

      Hackathons Projects
      Devpost for Teams

      Devpost for Teams

      Access your company's private hackathons

      Login
  • Host a hackathon
    • Devpost

      Devpost

      Grow your developer ecosystem and promote your platform

      Host a public hackathon
      Devpost for Teams logo

      Devpost for Teams

      Drive innovation, collaboration, and retention within your organization

      Host an internal hackathon

      By use case

      AI hackathons Customer hackathons Employee hackathons Public hackathons
  • Resources
    • Blog

      Insights into hackathon planning and participation

      Customer stories

      Inspiration from peers and other industry leaders

      Planning guides

      Best practices for planning online and in-person hackathons

      Webinars & events

      Upcoming events and on-demand recordings

      Help desk

      Common questions and support documentation

  • Log in
  • Sign up

PickHacks 2024

Descend
  • Overview
  • My projects
  • Participants (126)
  • Resources
  • Rules
  • Project gallery
  • Updates
  • Discussions
Connect with the participants – support your favorite projects by liking, sharing, and commenting on them.

Filter submissions

Sponsor Prizes
SAFE-NAV
SAFE-NAV

SAFE-NAV is a safer navigation system based on GPS/IMU integration with adaptive Q-learning

Winner Winner
Omar Rinchi Nawfal Guefrachi
5 0
Tsunami Drill
Tsunami Drill

Secure your future, one try at a time. Physical security hack.

Winner Winner
Aiturgan Talant Cocoa Milka
6 0
DeepBreak
DeepBreak

Don't want your pictures to be used for deep fakes? Then use DeepBreak it keeps the image the same to the human eye but poisons the image so AI's can't use it for deep fake training!

Winner Winner
Adam Nolle Sudeep Potluri ben9brooks Brooks M D
10 0
The Third Eye
The Third Eye

"ThirdEye: Beyond Vision — Unleashing the Power of AI to Guard Your Peace"

Winner Winner
Aniruddha Biswas Thirtha Karmakar Ashik Dey Rupak
15 0
Sentry Turret
Sentry Turret

An AI powered turret that uses facial recognition to identify targets.

Winner Winner
Austin Harkins kilianZ Zindel Duncan Truitt Trent
2 0
Priority Lens
Priority Lens

Priority Lens optimizes surveillance with an algorithm that places cameras based on the importance of zones. Ensuring priority areas are monitored, it enhances security efficiency and coverage.

Winner Winner
Azeem Ehtisham Connor Brinkman Riley Carter + 1
0 0
Safety in Numbers
Safety in Numbers

Have you ever been in a situation where you were uncomfortable and wanted to escape but couldn't find a subtle way to leave? That's why we devised an app that helps you do just that.

Winner Winner
Ruth Modde Anika Vydier Sanjana Vedanaparthi
5 0
TRUsteg
TRUsteg

Fortifying Security: Concealing Data in Stagnation

Winner Winner
umair iqbal
6 0
Sentinel Scan
Sentinel Scan

Introducing a cutting-edge AI-driven website vulnerability assessment tool, complete with an optimized personal workspace tailored to support students' browsing needs.

Winner Winner
Anshuman Mishra Justin David Alega Sibaie1 Alex Moravec
4 2
CAPTCHA Your Attention
CAPTCHA Your Attention

Verifying your identity doesn't need to be boring.

Winner Winner
Elijah Wolf Daniel Moore Logan Gray
6 1
Signature Manipulation Authenticator (SigMA)
Signature Manipulation Authenticator (SigMA)

Handwritten signatures have long been used for the verification of identity, and they could also be used for digital security purposes. We used machine learning to detect real and fake signatures.

Nathan Bradley Omar Abdelazim Doondi Ashlesh
1 0
Conscious Chrome-Extension
Conscious Chrome-Extension

Chrome extension built with React, Tailwind, TypeScript, using APIs to analyze tweets for propaganda intensity, reliability, and diverse perspectives

Nicholas Ragland Divyam Arora Jamari Bell maria anaya
16 0
LIFE: Lattice-Based Implementation For Encryption
LIFE: Lattice-Based Implementation For Encryption

Post quantum cryptography through the implementation of the LWE problem.

Kai-Shafe Shafe Brandon Stanfield HereForTheFood1 JoshCarus0
0 0
Mesh Network Security System
Mesh Network Security System

A mesh network of sensors that provides heightened physical security for large properties.

Liam Helfrich Austen Solvie Tyler Lunyou
0 2
Dance Door
Dance Door

Bringing security and cultural interchange together through dance.

Sam Hajdukiewicz Morgan Johnson Victor Loparco Adam Klassen
11 3
Ali's Privacy
Ali's Privacy

This project aims to serve as a way to secure your information.

Ali Mustarih
2 0
505 Emergency
505 Emergency

Empowering Hope, Saving Lives: 505 Emergency

Zach N. Novak Bigyan Rijal Urmat Urustemov
12 1
PhishNet
PhishNet

PhishNet: Catching Scams, Not FishThis is a fraudulent website detector that will stop you from entering sensitive information into a fraudulent-looking website.

joseperla1 Perla James Onanian Shreyas Mocherla
4 0
Password generator
Password generator

Generate a cool password!

Nithya Kalepalli Prisha Anil
0 0
DeceptiGuard
DeceptiGuard

Defending reality, one face at a time.

Shibam Pokhrel AnupRijal Rijal
11 0
JuiceGuard: Protecting Your Device from Juice Jacking
JuiceGuard: Protecting Your Device from Juice Jacking

With Increasing demands of public spaces and increasing demand of Charging Stations. Keeping Your Devices Safe from Juice Jacking, One Charge at a Time.

Rahul Chaudhari
6 0
MetaNight shade
MetaNight shade

Deep fakes are becoming more prevalent with the popularity of AI. Our goal is to prevent others from using your Instagram profile to do deep fakes.

Austen Solvie Liam Helfrich Tyler Lunyou
1 0
RhinoHat - Secure Messaging and File Sharing
RhinoHat - Secure Messaging and File Sharing

Want to securely message anonymously?

Alex Djidjev
1 0
Identity Solutions
Identity Solutions

When interacting online, it's hard to know if the person on the other end is genuine. Our goal is to provide an easy solution for individuals to authenticate online identities

colin smith Nathan Rothweiler
3 1

1 – 24 of 36

  • «
  • 1
  • 2
  • »

Devpost

  • About
  • Careers
  • Contact
  • Help

Hackathons

  • Browse hackathons
  • Explore projects
  • Host a hackathon
  • Hackathon guides

Portfolio

  • Your projects
  • Your hackathons
  • Settings

Connect

  • Twitter
  • Discord
  • Facebook
  • LinkedIn
© 2026 Devpost, Inc. All rights reserved.
  • Community guidelines
  • Security
  • CA notice
  • Privacy policy
  • Terms of service