07-09th February 2025

CYBER 2025 HACK

producer

🏆 Top 20 Teams - CyberHack 2025 🚀

#Team NameLead Name
1CyberDefendersAkhilesh Ramesh Wadsamudrakar
2CybocratsAaradhya Bali
3Team NexusAryan Paratakke
4DebuggerHimanshu Jagannath Chavan
51 DirectionJayesh Shete
6siddhi matesiddhi mate
7Identity SentinelsHarsh Vardhan Khajuria
8Team MahakumbhSubrata Dhibar
9ProjectXAnsh Choube
10Code CrackersKUNJAL SUGANDH
11AmigosAdwait Salankar
12NetObscuraGaurav Sangwan
13Team VigyaanShehzaan Ahmed Sheikh
14CyberPackSmruti Suman Badjena
15The EncryptorsSwayam Singh Bora
16Code DefendersShruti Chourasia
17IT_TGPCETJayesh Fating
18TripleByteManya Asrani
19Localhost:3000Sharvit Kashikar
20Dark Web DefendersNikhil Damahe

Main Price

gold-medal

WINNER : ₹ 100000

gold-medal

FIRST RUNNER UP : ₹ 75000

gold-medal

SECOND RUNNER UP : ₹ 50000

7th, 8th & 9th

Feb' 25

IIM Nagpur

Last Date : 31th Jan

producer

Time Schedule

PRELIMINARY ROUND VIRTUAL

Begin your journey! Register your team and prepare for an epic hackathon experience.

Team Shortlisting

20 teams will be shortedlisted for final round.

Winner Annoucment

The winner will be accounced .

Problem Statements

PROBLEM STATEMENT 1 :

There are social engineering frauds in which fake accounts of prominent people are created on social media and their friends are approached to transfer certain money into the accounts of fraudsters. Give a technical solution to be adopted by social media firms in which such types of fraud accounts are automatically deleted.

PROBLEM STATEMENT 2 :

Saving accounts and current accounts are taken on rent, and cybercrime gangs use these accounts for committing financial frauds at a very large scale. What technical solution can be adopted by banks to avoid the use of such rented accounts?

PROBLEM STATEMENT 3 :

Tools like VPN and TOR are used to mask the identity of accused individuals, who then send hoax bomb threats to airlines and other agencies. What tools can be adopted by an investigator to identify the accused even when a VPN is used by them?

PROBLEM STATEMENT 4 :

Fake Narrative: Internet is used for spreading fake narrative by spreading fake news and deep fake videos (using Al). Suggest a technical solution (or algorithm) for flagging deep fake videos circulating on internet and also a technical solution for highlighting fake news.

PROBLEM STATEMENT 5 :

Dark Web is used for spreading pornographic material, specially child pornography. Give a technical solution to scan dark web and identifying people (including complete details like name, address and mobile number, etc) uploading child pornography on dark web.

Time is Running Out,

Hacker's Assemble!

19
DAYS
24
HOURS
60
MINUTES
60
SECONDS

FAQ's

Contact Us: [email protected]

Phone: +91-8839497920, +91- 8806133723