Where Innovation
Meets Impact
The Chakravyuh Hackathon is a national innovation challenge bringing together developers, designers, cybersecurity experts, AI researchers, and engineers to solve real-world problems across multiple domains.
Our mission is to foster interdisciplinary collaboration and create solutions that have tangible real-world impact. From AI-powered healthcare to sustainable climate technology, participants tackle the most pressing challenges of our time.
With mentorship from industry experts, access to cutting-edge tools, and a competitive prize pool, Chakravyuh is where the next generation of innovators make their mark.
7 Domains, Infinite Possibilities
Cybersecurity
Detect threats, protect infrastructure, and build resilient security systems.
Cybersecurity + IoT
Secure IoT ecosystems across healthcare, industry, and smart homes.
Cybersecurity + AI
Leverage AI to detect advanced threats, deepfakes, and emerging attack patterns.
Cybersecurity + Cloud
Secure cloud infrastructure, detect anomalies, and embed security into DevOps.
Cybersecurity + Blockchain
Use blockchain to protect logs, mitigate DDoS, and secure digital identity.
Digital Forensics
Investigate cyber incidents, preserve evidence, and enable lawful access.
Open Innovation
Propose your own innovative cybersecurity solution to a real-world problem.
Choose Your Challenge
Automated High-Risk User Activity Detection
Automatically detect and prioritize high-risk user activitiesβsuch as anomalous logins, privilege misuse, and suspicious data accessβwithout overwhelming security teams.
Automated Copyright Infringement Detection
Enable platforms and rights holders to automatically detect and respond to evolving copyright infringement to protect intellectual property at scale.
Continuous Cybersecurity Posture Assessment
Enable organizations to continuously assess cybersecurity posture by identifying compliance gaps and evaluating policy effectiveness.
IoMT Security for Healthcare
Enable healthcare organizations to detect anomalies, prevent unauthorized access, and secure data transmitted between IoMT devices and hospital servers without disrupting performance or clinical workflows.
ICS/SCADA Cyber Threat Defense
Enable critical infrastructure operators to detect cyber threats, block unauthorized control commands, and maintain operational continuity in IoT-enabled industrial systems during cyberattacks.
Smart Home IoT Security Monitor
Enable households to discover connected IoT devices, monitor their behavior, detect suspicious activity, and receive real-time security alerts through a user-friendly interface.
AI-Powered Threat Intelligence Platform
Enable organizations to aggregate and analyze multi-source threat intelligence to uncover attack patterns, detect emerging threats, and generate actionable security insights.
Deepfake Detection System
Enable organizations and individuals to detect and flag deepfake audio, video, and images to prevent digital impersonation and cyber-enabled fraud.
Advanced Network Threat Detection
Enable organizations to monitor real-time network traffic and detect advanced threats, including zero-day exploits and stealth attacks, beyond traditional signature-based systems.
Cloud Security Risk Visualization
Develop a solution that enables organizations to automatically discover, visualize, and understand security risks across their cloud infrastructure and services.
AI-Driven Cloud Anomaly Detection
Design a solution that leverages AI to detect anomalous or suspicious activity in cloud environments and surface it in a way that is actionable for security teams.
DevSecOps for Cloud-Native Apps
Create a solution that helps development teams embed security into the full life cycle of cloud-native applications, from code to deployment and runtime.
Tamper-Proof Security Log System
Develop a solution that protects security logs from tampering, verifies their integrity and authenticity, and ensures trustworthy forensic and compliance analysis.
DDoS Mitigation Platform
Develop a solution to mitigate DDoS attacks by filtering malicious traffic and improving the resilience and availability of web applications and cloud services.
Decentralized Digital Credential Manager
Develop a solution for secure, user-controlled management of digital credentials that eliminates centralized storage risks and strengthens access control and confidentiality.
Memory Forensics & Malware Analysis
Develop a solution to detect and investigate memory-resident malware through secure live memory acquisition and reliable evidence preservation during active analysis.
Cloud Forensic Evidence Collection
Develop a solution for reliable forensic evidence collection and verification in distributed cloud environments while ensuring data integrity, origin validation, and legal admissibility.
Encrypted Device Forensic Access
Develop a solution to enable lawful access to critical evidence on encrypted devices while preserving data integrity and addressing legal and technical constraints.
Open Innovation
Participants can propose innovative solutions to any real-world problem of their choice, provided it aligns with the hackathon's theme and objectives.
The Journey Ahead
π Registration Opens
Team registration portal goes live. Form your teams and sign up early!
π Last Date of Registration
The last date to register for the hackathon
π‘ Idea Submission Deadline
Submit your proposed solution approach and initial prototype plan.
β‘ Prototype Development
Selected teams build their working prototypes with mentor support.
π€ Final Presentation
Teams present their solutions to the expert jury panel.
π Winners Announcement
Winners are announced at the grand ceremony with prizes and certificates.
Download PPT Template
Official Hackathon PPT Template
Use this official template for your final presentation. All teams must follow this format during the evaluation round.