TechFrontier Problem Statements

Select a team to view their problem statement

65
Total Teams
30
Unique Problems
#1
Team Localhost
Led by Chandra Kanth

Learning Support / AI Twin Bot Module

• A twin bot AI assistant students can consult when their mentor is unavailable. • Students ask questions; bot answers coherently and can generate additional explanations or examples. • Option to generate a PDF document that summarizes answers / explanations for deeper understanding. • Tracks the topics the student has covered to help tailor responses.
#2
Team salaar
Led by R.Arjun kumar

Personalized Learning Path Generator

Problem: Many students struggle with generic courses that don't match their skills. Challenge: Build an AI system that analyzes a student's past performance, interests, and learning style to generate a personalized learning path with course recommendations, quizzes, study schedules and provides instant explanations, examples, or hints. Deliverables: • Adaptive learning recommendations • AI-generated quiz questions • Progress tracking dashboard • Context-aware doubt resolution • Ability to handle multiple subjects/topics • Integration with text, video, and image-based content
#3
Team Taitan's
Led by Varthyavath Shiva Kumar

Zero Trust Architecture using Industry Standards

Theme: Network Access Security Problem Statement: Implement a Zero Trust Network (ZTN) framework that enforces continuous authentication and authorization using standards like OAuth2.0, OpenID Connect, and FIDO2. Requirements: • Continuous verification of user identity, device health, and context • Implement micro-segmentation to control internal access • Support adaptive access control (location, device, behavior) • Log all access attempts for auditing • Provide centralized policy engine for access control Bonus Challenges: • Integrate AI-driven risk scoring for adaptive policy decisions • Support hardware-based authentication (YubiKey/FIDO2) • Simulate an enterprise network environment for testing
#4
Code Crafters
Led by Boge Deepika

Digital Forensics & Incident Analysis Tool

Theme: Post-Incident Investigation Problem Statement: Build a digital forensics tool to extract, analyze, and recover evidence from compromised systems. The system should support metadata extraction, deleted file recovery, and log correlation. Requirements: • Extract metadata (timestamps, file owners, access info) • Recover deleted or partially corrupted files • Analyze system logs for malicious activities • Generate investigation timeline automatically • Export evidence reports for legal documentation Bonus Challenges: • Implement hash comparison for file integrity verification • Integrate with Volatility for memory forensics • Support multi-disk or image-based investigations
#5
Fire storm
Led by MAA TEJA NAIK

Supply Chain Transparency using Blockchain

Theme: Logistics & Traceability Problem Statement: Create a blockchain-powered system for tracking products from manufacturing to delivery, ensuring transparency and authenticity in the supply chain. Requirements: • Each product batch recorded as a blockchain transaction • Role-based access (supplier, distributor, retailer, consumer) • QR code tracking for every stage • Immutable logs of movement, timestamp, and handlers • Real-time dashboard for product traceability Bonus Challenges: • Integrate IoT sensors for automatic data updates • Use smart contracts for automated payments • Visualize supply chain flow with 3D/AR interface
#6
KALKI
Led by Sanjeevula varun

Automated Vulnerability Testing (OWASP Top 10)

Theme: Web Application Security Problem Statement: Build an automated vulnerability scanner that tests web applications for the OWASP Top 10 vulnerabilities and generates detailed reports with fix recommendations. Requirements: • Scan for SQL injection, XSS, CSRF, insecure deserialization, etc. • Support both authenticated and unauthenticated scans • Generate detailed vulnerability reports with severity and fix suggestions • Implement scheduling for periodic scans • Provide dashboard with vulnerability statistics per application Bonus Challenges: • Integrate with DevSecOps pipelines • Implement REST/GraphQL API scanning • Support automated retesting after fixes
#7
Dynamites
Led by Alvala Jay Hanuman

Secure File Vault using Android Keystore

Theme: Mobile Data Security Problem Statement: Create a secure file vault app that encrypts user files using Android Keystore, ensuring data protection even if the device is rooted or stolen. Requirements: • Encrypt/decrypt files using Keystore keys • Biometric (fingerprint/face) authentication for access • Prevent screenshots and background recording • Secure file deletion (overwrite and remove traces) • Display file access logs Bonus Challenges: • Integrate Google Drive/Dropbox backup with encrypted sync • Support decoy password for stealth mode • Detect and alert on root/jailbreak attempts
#8
CYBERTRAN
Led by KABILASH K N

Deepfake Shield for Real-Time Identity Verification

Background: Deepfakes are used in fraudulent banking calls, KYC bypass, and misinformation campaigns. Current detection is mostly offline. Challenge: Build a real-time multimodal deepfake detector (voice + video + behavior analysis). Expected Outcome: Verification layer for live video calls or financial KYC workflows. Datasets: • Face Forensics++ – https://github.com/ondyari/FaceForensics • ASVspoof 2019 – https://www.asvspoof.org/ • Deep Fake Detection Challenge (DFDC) – https://ai.meta.com/datasets/dfdc/
#9
TEAM GALAXY
Led by BADIGA TEJESH CHALAPATHI

Secure File Vault using Android Keystore

Theme: Mobile Data Security Problem Statement: Create a secure file vault app that encrypts user files using Android Keystore, ensuring data protection even if the device is rooted or stolen. Requirements: • Encrypt/decrypt files using Keystore keys • Biometric (fingerprint/face) authentication for access • Prevent screenshots and background recording • Secure file deletion (overwrite and remove traces) • Display file access logs Bonus Challenges: • Integrate Google Drive/Dropbox backup with encrypted sync • Support decoy password for stealth mode • Detect and alert on root/jailbreak attempts
#10
Coding Ninjas
Led by Anala Surendra

Credential Stuffing Prevention System

Theme: Authentication Security Problem Statement: Create a detection and prevention system for credential stuffing attacks using behavioral analytics and anomaly detection. Requirements: • Detect repeated login attempts with known credential patterns • Implement IP/device fingerprinting • Integrate CAPTCHA or MFA after suspicious activity • Provide real-time alerts and blocking • Maintain audit trail of detected incidents Bonus Challenges: • Train ML models using known credential stuffing datasets • Integrate with threat intelligence feeds • Visualize login anomalies on a heatmap dashboard
#11
Tech Vampires
Led by NELLURI UDAY KIRAN

Ransomware Detection & Containment System

Theme: Endpoint Security & Response Problem Statement: Design an intelligent ransomware detection system that can identify abnormal file encryption activity and automatically isolate infected endpoints to prevent network-wide spread. Requirements: • Monitor filesystem activity for encryption patterns • Detect abnormal CPU/disk usage and unauthorized file access • Implement automated containment (e.g., network isolation or process kill) • Use ML anomaly detection for real-time ransomware behavior recognition • Provide centralized dashboard for alerts and containment logs Bonus Challenges: • Implement sandbox analysis for unknown executables • Integrate with SIEM systems (e.g., Splunk/ELK) • Simulate ransomware attacks safely for testing detection accuracy
#12
TEAM KANYARAASI
Led by MANDALURU BABJI

HR / Employee Management Module

• Face recognition-based attendance: employees' faces are recognized in a specific location to mark presence automatically. • Track number of days present, total working hours per day/week/month. • Leave application & approval workflow. • Pay slip downloads. • Announcements, document request system, calendar of events/holidays, recent activity logs.
#13
AruMeXa
Led by S.AruI Kumaran

Retail & Billing / Inventory Module (EC-BMS)

• Product inventory management: listing products, tracking stock quantities, adjusting stock after each sale. • Billing / invoice generation when products sold; apply codes, taxes, discounts. • Track product sales over time; generate reports (daily, weekly, monthly). • Predictive insights / suggestions to increase sales: slow-moving products, bundling, special offers. • System to send special offers/promotions to customers.
#14
Fire Storm
Led by Kokkera Srinivas

Digital Marketing / Agency Module

• A public facing website for the business/agency, showcasing services (e.g. SaaS, web design, graphic design, marketing). • Built with only HTML, CSS, JavaScript, PHP (no external JS/CSS animation libraries). • Animations hand-coded. • Ability for business clients to upload their brand logo + type of business, and in response the system generates a basic website template or poster suited to them. • Contact form that can send messages to their WhatsApp. • Admin dashboard to collect user leads/data, track which pages/services are viewed, track traffic. • Portfolio page that is clean, well laid out, responsive design.
#15
Kingdom
Led by K.Siva sai Royal

Machine Learning-based Encrypted Traffic Anomaly Detection

Build a solution that applies unsupervised machine learning (e.g., clustering, autoencoders) to detect anomalies in encrypted network traffic metadata (packet sizes, timing, frequency) without decrypting the payload, helping to spot malicious behaviors like data exfiltration or command-and-control (C2) communication. Objective: Apply AI/ML to detect threats in encrypted environments where traditional signature-based detection fails. Input: Encrypted network traffic (PCAP files), connection metadata. Output: Anomaly score, flagged suspicious sessions, visualization of traffic patterns. Bonus: Self-learning model that improves detection accuracy over time.
#16
Roger pirates
Led by Chekuri Sai Chandra

Retail & Billing / Inventory Module (EC-BMS)

• Product inventory management: listing products, tracking stock quantities, adjusting stock after each sale. • Billing / invoice generation when products sold; apply codes, taxes, discounts. • Track product sales over time; generate reports (daily, weekly, monthly). • Predictive insights / suggestions to increase sales: slow-moving products, bundling, special offers. • System to send special offers/promotions to customers.
#17
BROOKLYN
Led by N. Rama Govinda Reddy

Learning Support / AI Twin Bot Module

• A twin bot AI assistant students can consult when their mentor is unavailable. • Students ask questions; bot answers coherently and can generate additional explanations or examples. • Option to generate a PDF document that summarizes answers / explanations for deeper understanding. • Tracks the topics the student has covered to help tailor responses.
#18
Echo
Led by Pitchuka Rahul Devanga

Learning Support / AI Twin Bot Module

• A twin bot AI assistant students can consult when their mentor is unavailable. • Students ask questions; bot answers coherently and can generate additional explanations or examples. • Option to generate a PDF document that summarizes answers / explanations for deeper understanding. • Tracks the topics the student has covered to help tailor responses.
#19
Pioneers
Led by Ravuri Krishna sai vardhan

Decentralized Freelance Escrow Platform

A trustless marketplace for freelancers and clients where smart contracts hold payments and release them based on milestone completion or dispute resolution through decentralized arbitration. • No platform fees (unlike Upwork/Fiverr taking 20%) • Reputation system stored on-chain • Automated payments upon work delivery • Community-based dispute resolution
#21
Black Clover
Led by MARNENI TRINADH

Machine Learning-based Encrypted Traffic Anomaly Detection

Build a solution that applies unsupervised machine learning (e.g., clustering, autoencoders) to detect anomalies in encrypted network traffic metadata (packet sizes, timing, frequency) without decrypting the payload, helping to spot malicious behaviors like data exfiltration or command-and-control (C2) communication. Objective: Apply AI/ML to detect threats in encrypted environments where traditional signature-based detection fails. Input: Encrypted network traffic (PCAP files), connection metadata. Output: Anomaly score, flagged suspicious sessions, visualization of traffic patterns. Bonus: Self-learning model that improves detection accuracy over time.
#22
Zorr
Led by CHUKKALURU YASWANTH KUMAR

File Integrity Checker using Blockchain

Theme: Data Authenticity Verification Problem Statement: Develop a blockchain-based system that verifies the integrity of files by storing their hash values immutably on a distributed ledger. Requirements: • Generate SHA-256 or SHA-3 hash for uploaded files • Record hash on blockchain (Ethereum/Polygon) • Verify file authenticity by comparing hash values • Display transaction logs and verification results • Provide API endpoints for integration Bonus Challenges: • Support batch verification and scheduled checks • Integrate IPFS for decentralized file storage • Implement tamper alert notifications
#23
Rise And Grind
Led by SHAIK AFRID BASHA

Learning Support / AI Twin Bot Module

• A twin bot AI assistant students can consult when their mentor is unavailable. • Students ask questions; bot answers coherently and can generate additional explanations or examples. • Option to generate a PDF document that summarizes answers / explanations for deeper understanding. • Tracks the topics the student has covered to help tailor responses.
#24
SKATERS
Led by Turpu Pranadeep Reddy

Secure Banking Transaction System with JWT Authentication

Problem Statement: Design and implement a secure banking API system that handles real-time fund transfers, account balance checks, and transaction history. The system must implement JWT-based authentication with access tokens (15-minute expiry) and refresh tokens (7-day expiry). Requirements: • Implement user login endpoint that returns both access and refresh tokens • Create protected endpoints for: balance inquiry, fund transfer, transaction history, and beneficiary management • Implement token refresh mechanism without requiring re-login • Handle concurrent transaction requests to prevent race conditions • Implement rate limiting (max 100 requests per minute per user) • Add real-time transaction notifications using WebSockets • Ensure atomic transactions (transfer should debit one account and credit another as a single operation) • Implement token blacklisting for logout functionality • Add 2FA verification for high-value transactions (>$10,000) Bonus Challenges: • Implement token rotation (issue new refresh token on each refresh) • Add device fingerprinting to bind tokens to specific devices • Implement suspicious activity detection (multiple failed auth attempts)
#25
TEAM SAMOSA
Led by Uppu Vishnu Brahmayya

Digital Marketing / Agency Module

• A public facing website for the business/agency, showcasing services (e.g. SaaS, web design, graphic design, marketing). • Built with only HTML, CSS, JavaScript, PHP (no external JS/CSS animation libraries). • Animations hand-coded. • Ability for business clients to upload their brand logo + type of business, and in response the system generates a basic website template or poster suited to them. • Contact form that can send messages to their WhatsApp. • Admin dashboard to collect user leads/data, track which pages/services are viewed, track traffic. • Portfolio page that is clean, well laid out, responsive design.
#26
Jk Warriors
Led by Abhijot Singh

Honeypot Trap Detection Framework

Theme: Intrusion Deception Systems Problem Statement: Develop a honeypot system that detects and logs unauthorized access attempts, analyzes attacker behavior, and sends alerts to administrators. Requirements: • Deploy multiple honeypots (SSH, HTTP, FTP, etc.) • Log attacker commands, IP, and timestamps • Analyze attack patterns and generate behavior profiles • Alert administrators in real time via dashboard or email • Implement visualization for attack trends Bonus Challenges: • Integrate ML for attack classification (bot, script, human) • Generate fake data environments to mislead attackers • Correlate honeypot data with firewall logs
#27
LEO
Led by ETIKALA SRAVAN KUMAR REDDY

Network Analysis and Anomaly Detection using AI

Theme: Intelligent Network Monitoring Problem Statement: Develop an AI-powered system that monitors real-time network traffic and detects anomalies, potential intrusions, or data exfiltration attempts. Requirements: • Capture live network packets and extract features • Use ML algorithms for anomaly detection • Classify normal vs malicious traffic • Provide dashboards for visualization (traffic flow, protocol stats) • Support alerts on detected anomalies Bonus Challenges: • Integrate with SNMP or NetFlow for enterprise monitoring • Implement explainable AI to justify anomaly decisions • Simulate DDoS or port scan attacks for testing
#28
Black Squad
Led by Venkata Sai Manoj Naidu Somarowthu

IoT-Based Child Safety Tracker

Problem & Challenge: Children in crowded areas risk getting lost. Develop an IoT system that tracks children in real time, detects when they leave safe zones, and notifies guardians instantly. The system should be accurate, low-power, and reliable. Objectives & Scope: • Wearable devices using GPS, RFID, BLE/LoRa for real-time tracking • Geofencing alerts for safe-zone breaches • Mobile/web platform for monitoring and notifications • Optimize low power consumption and validate through simulation and real-world testing
#29
Gym rats
Led by BADAM NARENDRA REDDY

AR Indoor and Outdoor Navigation App

Theme: Augmented Reality Navigation Problem Statement: Build an Android AR app that helps users navigate both indoor and outdoor environments using real-world overlays and 3D path guidance. Requirements: • Use ARCore for 3D navigation overlays • Integrate GPS for outdoor navigation • Use Wi-Fi or Bluetooth beacons for indoor positioning • Display arrows and labels in AR view • Include search for specific rooms, buildings, or points of interest Bonus Challenges: • Add voice-assisted navigation • Enable multi-floor navigation • Support offline maps and routes caching
#30
Nextlinkers
Led by Nischal S Tumbeti

Retail & Billing / Inventory Module (EC-BMS)

• Product inventory management: listing products, tracking stock quantities, adjusting stock after each sale. • Billing / invoice generation when products sold; apply codes, taxes, discounts. • Track product sales over time; generate reports (daily, weekly, monthly). • Predictive insights / suggestions to increase sales: slow-moving products, bundling, special offers. • System to send special offers/promotions to customers.
#31
POWER HOUSE
Led by Mavilla . Venkata Hemadri

Personalized Learning Path Generator

Problem: Many students struggle with generic courses that don't match their skills. Challenge: Build an AI system that analyzes a student's past performance, interests, and learning style to generate a personalized learning path with course recommendations, quizzes, study schedules and provides instant explanations, examples, or hints. Deliverables: • Adaptive learning recommendations • AI-generated quiz questions • Progress tracking dashboard • Context-aware doubt resolution • Ability to handle multiple subjects/topics • Integration with text, video, and image-based content
#32
CtrlAlt Defeat
Led by ASHWIN S

Secure File Sharing Platform

Theme: Data Confidentiality & Access Control Problem Statement: Develop an end-to-end encrypted file sharing system that ensures only authorized recipients can view or download shared files, even if the storage server is compromised. Requirements: • Implement client-side encryption using AES/RSA • User authentication and access control (link expiry, revoke access) • Store files securely with metadata encryption • Support sharing via temporary access tokens • Maintain activity logs for audit purposes Bonus Challenges: • Integrate blockchain for immutable access logs • Support large file uploads with chunked encryption • Add watermarking and access tracking
#33
Code Fusion
Led by DONGARA. MATHEWS KUMAR

Secure File Sharing Platform

Theme: Data Confidentiality & Access Control Problem Statement: Develop an end-to-end encrypted file sharing system that ensures only authorized recipients can view or download shared files, even if the storage server is compromised. Requirements: • Implement client-side encryption using AES/RSA • User authentication and access control (link expiry, revoke access) • Store files securely with metadata encryption • Support sharing via temporary access tokens • Maintain activity logs for audit purposes Bonus Challenges: • Integrate blockchain for immutable access logs • Support large file uploads with chunked encryption • Add watermarking and access tracking
#34
STRAW HATS
Led by PINJARI ABDUL RAHIMAN

Luxury Goods Provenance Tracking

Anti-counterfeiting system for high-end products (watches, handbags, sneakers) with verifiable authenticity and ownership history. • Each item gets a unique blockchain identity at manufacture • Track entire ownership chain (useful for resale) • Prove authenticity instantly via QR code • Combat fake luxury goods market • Warranty and repair history tracking
#35
NEW HUNTERS
Led by MOTAMARRI VEERENDRA KUMAR

Threat Simulation Training App

Theme: Cyber Awareness & Training Problem Statement: Design an Android app that simulates real-world cybersecurity attack scenarios to train users in identifying phishing, malware, and social engineering threats. Requirements: • Interactive phishing email and message simulations • Score-based evaluation for each simulation • Educational feedback after each attempt • Admin panel for generating new training scenarios • Track user progress and awareness improvement Bonus Challenges: • Integrate AR for physical security awareness scenarios • Implement gamified leaderboard system • Generate phishing templates using AI
#36
Trailblazers
Led by SRIDHAR R

Retail & Billing / Inventory Module (EC-BMS)

• Product inventory management: listing products, tracking stock quantities, adjusting stock after each sale. • Billing / invoice generation when products sold; apply codes, taxes, discounts. • Track product sales over time; generate reports (daily, weekly, monthly). • Predictive insights / suggestions to increase sales: slow-moving products, bundling, special offers. • System to send special offers/promotions to customers.
#37
Team Demons
Led by KADE KAMALAKAR

HR / Employee Management Module

• Face recognition-based attendance: employees' faces are recognized in a specific location to mark presence automatically. • Track number of days present, total working hours per day/week/month. • Leave application & approval workflow. • Pay slip downloads. • Announcements, document request system, calendar of events/holidays, recent activity logs.
#38
NullTrace
Led by Manoj Hariharan R

HR / Employee Management Module

• Face recognition-based attendance: employees' faces are recognized in a specific location to mark presence automatically. • Track number of days present, total working hours per day/week/month. • Leave application & approval workflow. • Pay slip downloads. • Announcements, document request system, calendar of events/holidays, recent activity logs.
#39
Incredible
Led by Manjula Tharun kumar

Learning Support / AI Twin Bot Module

• A twin bot AI assistant students can consult when their mentor is unavailable. • Students ask questions; bot answers coherently and can generate additional explanations or examples. • Option to generate a PDF document that summarizes answers / explanations for deeper understanding. • Tracks the topics the student has covered to help tailor responses.
#40
WASHI
Led by C.SAINATH REDDY

HR / Employee Management Module

• Face recognition-based attendance: employees' faces are recognized in a specific location to mark presence automatically. • Track number of days present, total working hours per day/week/month. • Leave application & approval workflow. • Pay slip downloads. • Announcements, document request system, calendar of events/holidays, recent activity logs.
#41
Vision X
Led by M Vishwak Sai

Retail & Billing / Inventory Module (EC-BMS)

• Product inventory management: listing products, tracking stock quantities, adjusting stock after each sale. • Billing / invoice generation when products sold; apply codes, taxes, discounts. • Track product sales over time; generate reports (daily, weekly, monthly). • Predictive insights / suggestions to increase sales: slow-moving products, bundling, special offers. • System to send special offers/promotions to customers.
#42
CodeXplorers
Led by PASAM VISHNU VARDHAN

Digital Marketing / Agency Module

• A public facing website for the business/agency, showcasing services (e.g. SaaS, web design, graphic design, marketing). • Built with only HTML, CSS, JavaScript, PHP (no external JS/CSS animation libraries). • Animations hand-coded. • Ability for business clients to upload their brand logo + type of business, and in response the system generates a basic website template or poster suited to them. • Contact form that can send messages to their WhatsApp. • Admin dashboard to collect user leads/data, track which pages/services are viewed, track traffic. • Portfolio page that is clean, well laid out, responsive design.
#43
Alpha V
Led by DUGGINENI DEVI SRUTHI

Defending AI Against Prompt Injection

Background: Generative AI is widely used, but prompt injection attacks can trick models into revealing confidential data or bypassing restrictions. Challenge: Build a real-time prompt injection detection & defense system that filters harmful prompts without blocking normal user input. Expected Outcome: A middleware/API wrapper for LLMs that flags or blocks malicious prompts in <200ms. Datasets: • AdvBench – adversarial prompt dataset (https://huggingface.co/datasets/walledai/AdvBench) • JailbreakBench – misuse/jailbreak behaviors (https://jailbreakbench.github.io/) • Safety Prompts Data Catalogue (https://safetyprompts.com/)
#44
Challengers
Led by Bhukya Neeraj Kumar

Digital Forensics — Hidden File Finder

Create a tool that scans a given directory or disk image for hidden files, deleted files, or steganography images using basic forensic techniques (e.g., file signature analysis, carving). Objective: Help beginners practice digital forensics skills. Input: Disk image (.img) or folder with files (some intentionally hidden). Output: List of recovered hidden/deleted files and extracted hidden images.
#45
Team OMI
Led by THATIKONDU VENKATA SAI CHARAN

IoT-Based Child Safety Tracker

Problem & Challenge: Children in crowded areas risk getting lost. Develop an IoT system that tracks children in real time, detects when they leave safe zones, and notifies guardians instantly. The system should be accurate, low-power, and reliable. Objectives & Scope: • Wearable devices using GPS, RFID, BLE/LoRa for real-time tracking • Geofencing alerts for safe-zone breaches • Mobile/web platform for monitoring and notifications • Optimize low power consumption and validate through simulation and real-world testing
#46
Asthra
Led by RAMISETTY DIVYA TEJA

Digital Marketing / Agency Module

• A public facing website for the business/agency, showcasing services (e.g. SaaS, web design, graphic design, marketing). • Built with only HTML, CSS, JavaScript, PHP (no external JS/CSS animation libraries). • Animations hand-coded. • Ability for business clients to upload their brand logo + type of business, and in response the system generates a basic website template or poster suited to them. • Contact form that can send messages to their WhatsApp. • Admin dashboard to collect user leads/data, track which pages/services are viewed, track traffic. • Portfolio page that is clean, well laid out, responsive design.
#47
V12
Led by GARLAPATI HANMANTH SAI RAM

Defending AI Against Prompt Injection

Background: Generative AI is widely used, but prompt injection attacks can trick models into revealing confidential data or bypassing restrictions. Challenge: Build a real-time prompt injection detection & defense system that filters harmful prompts without blocking normal user input. Expected Outcome: A middleware/API wrapper for LLMs that flags or blocks malicious prompts in <200ms. Datasets: • AdvBench – adversarial prompt dataset (https://huggingface.co/datasets/walledai/AdvBench) • JailbreakBench – misuse/jailbreak behaviors (https://jailbreakbench.github.io/) • Safety Prompts Data Catalogue (https://safetyprompts.com/)
#48
Team Inevitables
Led by Santimalla Lakshmidhar Reddy

Secure Banking Transaction System with JWT Authentication

Problem Statement: Design and implement a secure banking API system that handles real-time fund transfers, account balance checks, and transaction history. The system must implement JWT-based authentication with access tokens (15-minute expiry) and refresh tokens (7-day expiry). Requirements: • Implement user login endpoint that returns both access and refresh tokens • Create protected endpoints for: balance inquiry, fund transfer, transaction history, and beneficiary management • Implement token refresh mechanism without requiring re-login • Handle concurrent transaction requests to prevent race conditions • Implement rate limiting (max 100 requests per minute per user) • Add real-time transaction notifications using WebSockets • Ensure atomic transactions (transfer should debit one account and credit another as a single operation) • Implement token blacklisting for logout functionality • Add 2FA verification for high-value transactions (>$10,000) Bonus Challenges: • Implement token rotation (issue new refresh token on each refresh) • Add device fingerprinting to bind tokens to specific devices • Implement suspicious activity detection (multiple failed auth attempts)
#49
Team Nellore
Led by KODE DEEPAK

Decentralized Freelance Escrow Platform

A trustless marketplace for freelancers and clients where smart contracts hold payments and release them based on milestone completion or dispute resolution through decentralized arbitration. • No platform fees (unlike Upwork/Fiverr taking 20%) • Reputation system stored on-chain • Automated payments upon work delivery • Community-based dispute resolution
#50
TEAM DEVARA
Led by Matli Lakshmi Prasanna Kumar Reddy

NFT Marketplace

Theme: Digital Asset Trading Problem Statement: Build a decentralized NFT marketplace where users can mint, buy, sell, and trade digital assets securely using blockchain. Requirements: • Smart contracts for minting and transferring NFTs • User wallet integration (MetaMask or WalletConnect) • Display NFT metadata (image, price, owner, history) • Implement royalties for creators • Transaction history and verification on blockchain Bonus Challenges: • Enable cross-chain NFT trading • Integrate AI for NFT valuation or trend prediction • Add lazy minting for gas optimization
#51
Code Royals
Led by Besta Charitha

Digital Marketing / Agency Module

• A public facing website for the business/agency, showcasing services (e.g. SaaS, web design, graphic design, marketing). • Built with only HTML, CSS, JavaScript, PHP (no external JS/CSS animation libraries). • Animations hand-coded. • Ability for business clients to upload their brand logo + type of business, and in response the system generates a basic website template or poster suited to them. • Contact form that can send messages to their WhatsApp. • Admin dashboard to collect user leads/data, track which pages/services are viewed, track traffic. • Portfolio page that is clean, well laid out, responsive design.
#52
TEAM SPIRIT
Led by Dhudekula Zaheer

Threat Simulation Training App

Theme: Cyber Awareness & Training Problem Statement: Design an Android app that simulates real-world cybersecurity attack scenarios to train users in identifying phishing, malware, and social engineering threats. Requirements: • Interactive phishing email and message simulations • Score-based evaluation for each simulation • Educational feedback after each attempt • Admin panel for generating new training scenarios • Track user progress and awareness improvement Bonus Challenges: • Integrate AR for physical security awareness scenarios • Implement gamified leaderboard system • Generate phishing templates using AI
#53
TARGARYEN
Led by Varugu MD Anees

HR / Employee Management Module

• Face recognition-based attendance: employees' faces are recognized in a specific location to mark presence automatically. • Track number of days present, total working hours per day/week/month. • Leave application & approval workflow. • Pay slip downloads. • Announcements, document request system, calendar of events/holidays, recent activity logs.
#54
Black squad A
Led by SAM JOEL

AR Indoor and Outdoor Navigation App

Theme: Augmented Reality Navigation Problem Statement: Build an Android AR app that helps users navigate both indoor and outdoor environments using real-world overlays and 3D path guidance. Requirements: • Use ARCore for 3D navigation overlays • Integrate GPS for outdoor navigation • Use Wi-Fi or Bluetooth beacons for indoor positioning • Display arrows and labels in AR view • Include search for specific rooms, buildings, or points of interest Bonus Challenges: • Add voice-assisted navigation • Enable multi-floor navigation • Support offline maps and routes caching
#55
TEAM VLC
Led by KATTA VEERANJINEYULU

Community Unit Hub (Discord-style App)

Theme: Social Collaboration Platform Problem Statement: Develop an Android application that acts as a digital community hub for clubs or groups, allowing chat, voice, and event collaboration similar to Discord. Requirements: • Create chat channels and voice rooms • Implement real-time messaging with Firebase or WebSocket • User roles and permissions for admins/moderators • Event scheduling and notifications • Support file/image sharing within groups Bonus Challenges: • Integrate AI chatbot for Q&A or moderation • Add voice-to-text transcription for accessibility • Implement message encryption for privacy
#56
CLUTCH GODS
Led by T.Chandra shekar

File Integrity Checker using Blockchain

Theme: Data Authenticity Verification Problem Statement: Develop a blockchain-based system that verifies the integrity of files by storing their hash values immutably on a distributed ledger. Requirements: • Generate SHA-256 or SHA-3 hash for uploaded files • Record hash on blockchain (Ethereum/Polygon) • Verify file authenticity by comparing hash values • Display transaction logs and verification results • Provide API endpoints for integration Bonus Challenges: • Support batch verification and scheduled checks • Integrate IPFS for decentralized file storage • Implement tamper alert notifications
#57
Shadowforce
Led by Kasaraneni Chandra sen

Phishing URL Classifier using Public Datasets

Theme: Web Security & Threat Detection Problem Statement: Build a machine learning classifier that can identify phishing URLs with high accuracy using publicly available datasets. Requirements: • Feature extraction from URLs (domain age, HTTPS, special characters, etc.) • Train models using multiple algorithms (Random Forest, XGBoost, Neural Networks) • Achieve >95% accuracy on test datasets • Create API endpoint for real-time URL classification • Provide confidence scores and explanation for predictions Bonus Challenges: • Integrate with browser extension for real-time protection • Support multilingual phishing detection • Implement model retraining pipeline with new threat data
#58
Hack Squad
Led by Yerra Thrinesh

AI-Powered Real-Time Fraud & Identity Theft Platform

Problem: Users often lack awareness of identity theft risks and preventive measures. Additionally, fraud detection is usually reactive, and users have limited exposure to real-time scenarios in banking, e-commerce, and digital identity management. Challenge: Develop an AI-driven platform that detects and prevents identity theft and fraud. The platform should simulate real-time scenarios, including unusual login patterns, fake documents, suspicious transactions, and e-commerce scams. Users should be able to practice AI-guided detection and decision-making while receiving personalized feedback. Deliverables: • Simulated identity theft and fraud cases • Live scenario simulations with AI-guided feedback • Interactive detection and preventive exercises • Decision-making scoring system • Personalized modules and risk assessment quizzes
#59
Coders
Led by Kanti Varun Venkat

Network Analysis and Anomaly Detection using AI

Theme: Intelligent Network Monitoring Problem Statement: Develop an AI-powered system that monitors real-time network traffic and detects anomalies, potential intrusions, or data exfiltration attempts. Requirements: • Capture live network packets and extract features • Use ML algorithms for anomaly detection • Classify normal vs malicious traffic • Provide dashboards for visualization (traffic flow, protocol stats) • Support alerts on detected anomalies Bonus Challenges: • Integrate with SNMP or NetFlow for enterprise monitoring • Implement explainable AI to justify anomaly decisions • Simulate DDoS or port scan attacks for testing
#60
Team Rocks
Led by SAYED AFAN ALI

Ransomware Detection & Containment System

Theme: Endpoint Security & Response Problem Statement: Design an intelligent ransomware detection system that can identify abnormal file encryption activity and automatically isolate infected endpoints to prevent network-wide spread. Requirements: • Monitor filesystem activity for encryption patterns • Detect abnormal CPU/disk usage and unauthorized file access • Implement automated containment (e.g., network isolation or process kill) • Use ML anomaly detection for real-time ransomware behavior recognition • Provide centralized dashboard for alerts and containment logs Bonus Challenges: • Implement sandbox analysis for unknown executables • Integrate with SIEM systems (e.g., Splunk/ELK) • Simulate ransomware attacks safely for testing detection accuracy
#61
Apx Gp
Led by BoppadaIa.NagaSanjay

Digital Forensics — Hidden File Finder

Create a tool that scans a given directory or disk image for hidden files, deleted files, or steganography images using basic forensic techniques (e.g., file signature analysis, carving). Objective: Help beginners practice digital forensics skills. Input: Disk image (.img) or folder with files (some intentionally hidden). Output: List of recovered hidden/deleted files and extracted hidden images.
#62
TEAM APEX
Led by APPALA VENKATA SAI NIKHIL

Luxury Goods Provenance Tracking

Anti-counterfeiting system for high-end products (watches, handbags, sneakers) with verifiable authenticity and ownership history. • Each item gets a unique blockchain identity at manufacture • Track entire ownership chain (useful for resale) • Prove authenticity instantly via QR code • Combat fake luxury goods market • Warranty and repair history tracking
#63
ALCO NINJAS
Led by BATTALA DHARANEESWAR

NFT Marketplace

Theme: Digital Asset Trading Problem Statement: Build a decentralized NFT marketplace where users can mint, buy, sell, and trade digital assets securely using blockchain. Requirements: • Smart contracts for minting and transferring NFTs • User wallet integration (MetaMask or WalletConnect) • Display NFT metadata (image, price, owner, history) • Implement royalties for creators • Transaction history and verification on blockchain Bonus Challenges: • Enable cross-chain NFT trading • Integrate AI for NFT valuation or trend prediction • Add lazy minting for gas optimization
#64
Gen-z core
Led by MARRI.UDAY RAJA SEKHAR REDDY

Honeypot Trap Detection Framework

Theme: Intrusion Deception Systems Problem Statement: Develop a honeypot system that detects and logs unauthorized access attempts, analyzes attacker behavior, and sends alerts to administrators. Requirements: • Deploy multiple honeypots (SSH, HTTP, FTP, etc.) • Log attacker commands, IP, and timestamps • Analyze attack patterns and generate behavior profiles • Alert administrators in real time via dashboard or email • Implement visualization for attack trends Bonus Challenges: • Integrate ML for attack classification (bot, script, human) • Generate fake data environments to mislead attackers • Correlate honeypot data with firewall logs
#65
DREAM CODERS
Led by VANGA VENKATA CHARAN SIVA KUMAR

Deepfake Shield for Real-Time Identity Verification

Background: Deepfakes are used in fraudulent banking calls, KYC bypass, and misinformation campaigns. Current detection is mostly offline. Challenge: Build a real-time multimodal deepfake detector (voice + video + behavior analysis). Expected Outcome: Verification layer for live video calls or financial KYC workflows. Datasets: • Face Forensics++ – https://github.com/ondyari/FaceForensics • ASVspoof 2019 – https://www.asvspoof.org/ • Deep Fake Detection Challenge (DFDC) – https://ai.meta.com/datasets/dfdc/
#66
Debug Thugs
Led by JUNNURU AKHIL VENKATA SATYA KARTHIK

Community Unit Hub (Discord-style App)

Theme: Social Collaboration Platform Problem Statement: Develop an Android application that acts as a digital community hub for clubs or groups, allowing chat, voice, and event collaboration similar to Discord. Requirements: • Create chat channels and voice rooms • Implement real-time messaging with Firebase or WebSocket • User roles and permissions for admins/moderators • Event scheduling and notifications • Support file/image sharing within groups Bonus Challenges: • Integrate AI chatbot for Q&A or moderation • Add voice-to-text transcription for accessibility • Implement message encryption for privacy