Cybersecurity Final Year Project Ideas

15 in-depth projects covering ethical hacking, IDS, cryptography, and digital forensics — with full modules, tech stack, and career relevance.

15
Project Ideas
OWASP
Aligned
⭐–⭐⭐⭐
All Levels
24h
Proposal Turnaround

📋 All Projects on This Page

01

AI-Powered Phishing Email Detection System

⭐⭐ Medium Cybersecurity / NLP

An NLP-based email classifier that scans incoming emails for phishing indicators — suspicious URLs, spoofed sender addresses, urgency-based language patterns, and malicious attachment types. Achieves high precision to minimise false positives for legitimate email.

Modules
  • Email Header & Body Parser
  • URL Extraction & Reputation Check
  • NLP Feature Engineering (TF-IDF/BERT)
  • Random Forest / LSTM Classifier
  • Confidence Score Dashboard
  • Whitelist & Feedback Loop
Tech Stack
PythonScikit-learnHuggingFace TransformersNLTKFlaskVirusTotal APIReactMySQL
Directly relevant for SOC Analyst, Email Security, and Threat Intelligence roles at companies like Symantec, Palo Alto Networks, and enterprise IT security teams.
02

Intrusion Detection System (IDS) using ML

⭐⭐ Medium Cybersecurity / Network

A network traffic analyser that classifies packets as normal or attack traffic (DoS, DDoS, port scan, brute force) using a machine learning classifier trained on the CICIDS2018 dataset. Includes real-time alert generation and a SIEM-style dashboard.

Modules
  • Packet Capture / PCAP Parsing
  • Feature Engineering (flow statistics)
  • Multi-Class Attack Classifier
  • Real-Time Alert Generation
  • Attack Type Dashboard
  • Threat Report Export
Tech Stack
PythonScikit-learn / XGBoostScapy / PysharkFlaskReactMySQLPandasMatplotlib
Core cybersecurity role — IDS/IPS knowledge is expected at all SOC Analyst, Network Security Engineer, and Threat Detection roles. Strong research paper potential.
03

Web Application Vulnerability Scanner

⭐⭐⭐ Advanced Cybersecurity / AppSec

An automated web security scanner that probes target URLs for OWASP Top 10 vulnerabilities including SQL injection, XSS, CSRF, insecure headers, and open redirects. Generates a professional pentest-style vulnerability report with severity ratings and remediation guidance.

Modules
  • URL Input & Crawler Module
  • SQL Injection Probe Engine
  • XSS (Reflected & Stored) Detector
  • CSRF Token Checker
  • Security Header Analyser
  • PDF Vulnerability Report Generator
Tech Stack
PythonRequests / SeleniumBeautifulSoupSQLMap (integration)FlaskReportLab (PDF)ReactSQLite
AppSec Engineer, Penetration Tester, and Bug Bounty Hunter roles. OWASP vulnerability knowledge is mandatory for all application security positions. Note: only test on systems you own or have permission to test.
04

Malicious URL Detection using ML

⭐ Easy Cybersecurity / ML

A real-time URL reputation checker that extracts lexical, host-based, and content-based features from URLs and classifies them as benign, phishing, malware, or defacement using an ensemble ML model. Includes a browser extension prototype.

Modules
  • URL Feature Extraction (lexical + WHOIS)
  • Multi-Class URL Classifier
  • Real-Time API Endpoint
  • Browser Extension Prototype (Chrome)
  • Threat Category Dashboard
  • Feedback & Retraining Loop
Tech Stack
PythonScikit-learn / XGBoostRequestspython-whoisFlaskChrome Extension (JS)SQLiteReact
Threat Intelligence, URL Filtering, and Browser Security roles. Lightweight ML application that demonstrates both security domain knowledge and practical API development.
05

Secure File Storage System with Encryption

⭐⭐ Medium Cybersecurity / Cryptography

A personal cloud storage platform implementing AES-256 encryption for all uploaded files, with SHA-256 integrity verification, role-based access control, and a full audit trail. Files are encrypted client-side before upload — ensuring zero-knowledge storage.

Modules
  • User Auth & Key Derivation (PBKDF2)
  • AES-256 Client-Side Encryption
  • Encrypted File Upload & Storage
  • Integrity Verification (SHA-256)
  • Secure File Sharing (time-limited links)
  • Access Log & Audit Trail
Tech Stack
Python / JavaAES-256PBKDF2 Key DerivationFlask / Spring BootReactAWS S3 (encrypted)PostgreSQLJWT
Cryptography, Cloud Security, and Data Privacy roles. Demonstrates practical implementation of encryption standards — highly valued at security-focused companies and cloud service providers.
06

Honeypot & Attack Analysis Dashboard

⭐⭐⭐ Advanced Cybersecurity / Threat Intel

Deploys a simulated vulnerable server (honeypot) that logs and analyses attacker behaviour — recording connection attempts, login brute-force patterns, exploit payloads, and geographic origin. A SIEM-style dashboard visualises attack patterns and generates threat intelligence reports.

Modules
  • Low-Interaction Honeypot Service
  • Attack Log Collection & Parser
  • IP Geolocation & Reputation Lookup
  • Attack Pattern Visualisation
  • Threat Intelligence Report Generator
  • Alert & Email Notification System
Tech Stack
PythonFlask (honeypot server)MaxMind GeoIP2ElasticSearch / SQLiteReactChart.jsShodan APIPandas
Threat Intelligence Analyst, SOC Engineer, and Red Team roles. Operating and analysing a honeypot demonstrates advanced understanding of attacker TTPs (Tactics, Techniques, Procedures).
07

Browser Extension for Detecting Unsafe Websites

⭐ Easy Cybersecurity / Browser Security

A Chrome/Firefox browser extension that rates website safety in real time — checking SSL certificate validity, domain age, Google Safe Browsing status, and known phishing indicators. Displays a safety badge and blocks navigation to high-risk sites.

Modules
  • SSL Certificate Validation
  • Domain Age & WHOIS Check
  • Google Safe Browsing API Integration
  • Phishing Indicator Heuristics
  • Safety Badge Overlay
  • Blocklist & Whitelist Management
Tech Stack
JavaScript (Chrome Extension)Google Safe Browsing APIVirusTotal APIPython (backend scoring)FlaskSQLite
Browser Security, Client-Side Security, and Security Product Development roles. Chrome extensions demonstrate JavaScript + security API integration — practical and portfolio-friendly.
08

Network Packet Sniffer & Protocol Analyser

⭐⭐ Medium Cybersecurity / Network Forensics

A network forensics tool that captures live packets on a selected interface, dissects protocol layers (Ethernet, IP, TCP/UDP, HTTP/DNS), reconstructs sessions, and flags suspicious patterns like port scans, ARP spoofing, and cleartext password transmission.

Modules
  • Live Packet Capture Interface
  • Protocol Dissector (Ethernet/IP/TCP/DNS)
  • Session Reconstruction Module
  • Port Scan & ARP Spoof Detector
  • Cleartext Credential Detector
  • PCAP Export & Replay
Tech Stack
PythonScapyPysharkSocket ProgrammingTkinter / React (GUI)SQLiteWireshark (PCAP format)
Network Forensics, SOC Analyst, and Network Engineer roles. Deep understanding of TCP/IP stack is fundamental for all security certifications (CEH, OSCP). Best project for students targeting network security careers.
09

Ransomware Behaviour Simulator (Safe/Educational)

⭐⭐⭐ Advanced Cybersecurity / Malware Analysis

A sandboxed, safe educational simulator that demonstrates ransomware behaviour patterns — file system scanning, extension filtering, symmetric encryption, ransom note generation, and C2 communication simulation — on designated test files only, with full rollback. No malicious payload.

Modules
  • Safe File Encryption Simulation (test files only)
  • Extension Targeting Logic
  • Ransom Note Generator
  • Simulated C2 Communication (localhost)
  • Complete Decryption & Rollback
  • Behaviour Analysis Dashboard
Tech Stack
PythonAES EncryptionWatchdog (file monitoring)Flask (C2 simulation)PyQt5 (GUI)SQLite
Malware Analysis, Incident Response, and Security Research roles. Educational ransomware simulation demonstrates advanced threat understanding — impressive for cybersecurity specialist interviews. Must clearly document safe scope in documentation.
10

Biometric Authentication System

⭐⭐ Medium Cybersecurity / Identity

A multi-factor authentication system combining facial recognition and fingerprint verification. The system registers users biometrically, then validates identity at login using a CNN-based face matcher and fingerprint feature comparison — eliminating password-based vulnerabilities.

Modules
  • Facial Registration & Feature Extraction
  • CNN-Based Face Recognition
  • Fingerprint Feature Extraction
  • Multi-Factor Auth Engine
  • Liveness Detection (anti-spoofing)
  • Auth Attempt Audit Log
Tech Stack
Pythonface_recognition / DeepFaceOpenCVFingerprintPy / PyFingerprintFlaskReactPostgreSQLJWT
Identity & Access Management (IAM), Biometric Security, and Authentication Platform roles. Biometric authentication is replacing passwords across enterprise and consumer security — strong future relevance.
11

Secure Chat Application with E2E Encryption

⭐⭐ Medium Cybersecurity / Cryptography

A real-time messaging application where all messages are encrypted end-to-end using the Signal Protocol (X3DH key exchange + Double Ratchet algorithm). The server never stores plaintext — even a compromised server cannot read messages. Includes forward secrecy.

Modules
  • User Registration & Key Exchange (X3DH)
  • Double Ratchet Message Encryption
  • Real-Time Messaging (WebSockets)
  • Group Chat with Key Distribution
  • Message Deletion & Disappearing Messages
  • Key Verification (Safety Numbers)
Tech Stack
Python / JavaSignal ProtocolX3DH + Double RatchetWebSocketsFlask / Spring BootReactPostgreSQLLibsodium / Bouncy Castle
Cryptography Engineer, Secure Communications, and Privacy-Tech roles. Implementing Signal Protocol is a technically impressive feat — strong differentiator in security interviews.
12

Password Manager with Encrypted Vault

⭐⭐ Medium Cybersecurity / Cryptography

A personal password manager where all credentials are stored in an AES-256-GCM encrypted vault, protected by a master password using PBKDF2/Argon2 key derivation. Includes a password strength analyser, breach checker (HaveIBeenPwned API), and secure password generator.

Modules
  • Master Password & Key Derivation (Argon2)
  • AES-256-GCM Vault Encryption
  • Password Entry CRUD
  • Breach Check (HaveIBeenPwned API)
  • Password Strength Meter
  • Secure Password Generator
  • Browser Extension (optional)
Tech Stack
Python / JavaAES-256-GCMArgon2 / PBKDF2HaveIBeenPwned APIFlask / Spring BootReactSQLite (encrypted)
Security Software Development, Privacy Tools, and Cryptography roles. Password managers are a classic cryptographic application — demonstrates key derivation, symmetric encryption, and secure storage patterns.
13

Log Monitoring & Alerting System (Mini SIEM)

⭐⭐⭐ Advanced Cybersecurity / SIEM

A lightweight Security Information and Event Management (SIEM) system that ingests logs from multiple sources (web server, firewall, SSH), parses and normalises them, applies correlation rules to detect attacks (brute force, privilege escalation, data exfiltration), and sends real-time alerts.

Modules
  • Multi-Source Log Ingestion (syslog/JSON)
  • Log Parsing & Normalisation Engine
  • Correlation Rule Engine
  • Real-Time Alert Generation
  • Threat Dashboard (Grafana-like)
  • Incident Ticket Creation
Tech Stack
PythonELK Stack (Elasticsearch/Logstash/Kibana)PandasFlaskReactRedisPostgreSQLTwilio (SMS alerts)
SOC Analyst, SIEM Engineer, and Security Operations roles. SIEM knowledge is mandatory for all enterprise security positions — building one from scratch demonstrates exceptional depth.
14

IoT Device Security Scanner

⭐⭐ Medium Cybersecurity / IoT

A network scanner that discovers IoT devices on a subnet, fingerprints device type and firmware version, checks for default credentials, open ports, and known CVEs (Common Vulnerabilities and Exposures), and generates a risk assessment report.

Modules
  • IoT Device Discovery (Nmap integration)
  • Device Fingerprinting & OS Detection
  • Default Credential Testing
  • Open Port & Service Enumeration
  • CVE Lookup (NVD API)
  • Risk Assessment PDF Report
Tech Stack
PythonNmap / python-nmapShodan APINVD CVE APIFlaskReactSQLiteReportLab
IoT Security, Penetration Testing, and Embedded Security roles. IoT security is one of the fastest-growing cybersecurity domains — scanners like this are used by security consultants and enterprise IT teams.
15

Digital Forensics Evidence Analysis Tool

⭐⭐⭐ Advanced Cybersecurity / Digital Forensics

A digital forensics workbench that analyses disk images, memory dumps, and file artefacts — extracting metadata, recovering deleted files, identifying steganographic content, generating MD5/SHA256 file hashes, and producing a chain-of-custody evidence report.

Modules
  • Disk Image Mounting & File Extraction
  • Deleted File Recovery Module
  • Metadata Extraction (EXIF, timestamps)
  • Steganography Detection (LSB analysis)
  • Hash Generation & Integrity Verification
  • Chain-of-Custody Evidence Report (PDF)
Tech Stack
Pythonpytsk3 (disk forensics)Volatility3 (memory analysis)Pillow / SteganoScanHashlibFlaskReactReportLab
Digital Forensics Investigator, Incident Responder, and Law Enforcement Tech roles. Forensics tools are used in cybercrime investigation — a niche, high-value specialisation with government and enterprise demand.

Want to Build One of These?

ADR Lab provides complete development — code, documentation, deployment, and viva support.