Want to make creations as awesome as this one?

More creations to inspire you


Begin our journey...

AI HackmastersHafsa KhanAbdelbasit LemamshaUzair Ahmed

Armour AI

Join us in our approach

The Future


Chosen Domain


Web Application



Data Collection



Generative AI coding solutions tend to follow a 'functionality' first approach.This neglects security issues posed to an organisation - which arguably leads to organisations straying away from utilising AI for their software egineering solutions

Developing Our Idea



Our Solution

Deploying LLM and training it on a database of coding vulnerabilities and their solutions intially -> in a smalll range of programming languages.This was done to explore effectiveness and viable usage of this idea.


  • CrowdStrike - Charlotte AI
  • LexisNexis® ThreatMetrix
  • NVIDIA Morpheus
  • Broadcom - SymantecAI
  • AMD Xilinx - PFP Cybersecurity

Current competitors in the market

Implementing our idea

Model training was challenging as it required multiple attempts to accurately tokenize the data.Our vision was too high for these 24 hours we had to really simplify the idea down to its core MvP.

Challenges encountered

Employs deep learning to tailor attacks according to specific software and its vulnerabilities, derived from standard attacks (essentially a GAN). The model then provides feedback on the success of the attack and its severity.

Providing users with a complimentary software vulnerability assessment and a brief overall score, without further explanations, is particularly effective for marketing purposes.

The Future

Thank you!

The Website Application

The programming languages used for the implementation of the website was HTML, CSS, and JavaScript. Originally, SquareSpace was used but we realised we couldn not add the API link to the webpage therefore we proceeded with making the website through Visual Studio Code and implemented the requiremed scripts on the website.

Data Collection

Centre for Strategic & International Studies

Analysed a dataset containing cyber attacks that occurred between 2006 and 2024 in order to extrapolate the most prevalent types of cyberattacks and their corresponding impacts. Then, we discovered a labelled dataset on GitHub, which influenced our decision to proceed with this method rather than the others in order to identify common vulnerabilities in code and solutions.

Technologies used

LLM & Hugging Face

The technologies that we implemented for the LLM model was using Python, and Pandas, Transformers Library, seaborn for visualisations.StarCoder on base model and trained on Open Platapus database and a database from Github that contains vulnearabilities in C and C++.