Master's in Cyber Forensics @ Purdue University Bachelor's in Computer Science @ Purdue University
π Carmel, IN | π Recent Graduate
π Passionate about low-level systems, reverse engineering, and digital forensics
π» Building scalable microservices and tools that bridge security research and practical investigation
I'm a software developer and security researcher specializing in cyber forensics, low-level systems programming, and scalable microservice architectures. My work spans from building forensic investigation tools and binary disassemblers to designing microservice-based systems for scalable data analysis. I'm driven by the challenge of understanding how systems work at their core and creating practical, performant solutions for both security analysis and large-scale data processing.
With a strong foundation in both high-level application development and low-level systems programming, I thrive at the intersection of security research and software engineering. Whether I'm architecting microservices for data analysis, reverse engineering binaries, developing forensic tools, or implementing machine learning for anomaly detection, I'm constantly exploring new ways to solve complex technical challenges.
- Reverse Engineering: Binary analysis, disassembly, instruction decoding
- File Formats: ELF, Mach-O, PE analysis and parsing
- Architectures: ARM64, x86-64 instruction sets
- Forensics: Digital evidence analysis, geolocation correlation, file integrity monitoring
- Microservices: Scalable system design, distributed architectures
- Data Analysis: Large-scale data processing pipelines and analytics platforms
- Backend Development: RESTful APIs, service orchestration, database optimization
π οΈ Binary Disassembler
A lightweight, educational disassembler that decodes machine code from executable files into human-readable assembly instructions.
π§ Tech Stack: C ARM64 x86-64 ELF Mach-O
π― Focus: Binary analysis, instruction decoding, executable file format parsing
β¨ Highlights:
- Supports multiple architectures (ARM64, x86-64)
- Parses ELF and Mach-O executable formats
- Clean, educational codebase for understanding binary structures
- Built from scratch to understand low-level system internals
π View Repository
A specialized forensic investigation tool designed to correlate geolocation data with various types of digital evidence for law enforcement and investigative purposes.
π§ Tech Stack: JavaScript ElectronJS SQLite
π― Focus: Digital forensics, evidence correlation, geospatial analysis
β¨ Highlights:
- Cross-platform desktop application for investigators
- Efficient geolocation matching and evidence correlation
- User-friendly interface for complex forensic workflows
π View Repository
An intelligent anomaly detection system leveraging deep learning to monitor and detect suspicious file operations in real-time.
π§ Tech Stack: Python TensorFlow/Keras ML/DL
π― Focus: Anomaly detection, machine learning, behavioral analysis
β¨ Highlights:
- Neural network-based pattern recognition
- Real-time file operation monitoring
- Adaptive learning for unknown threat detection
- Practical application of AI in cybersecurity
- Binary Analysis & Reverse Engineering: Understanding software at the assembly level
- Digital Forensics: Developing tools for criminal investigations and incident response
- Malware Analysis: Analyzing malicious code behavior and detection techniques
- Low-Level Systems Programming: Operating systems, file formats, and executable structures
- Applied Machine Learning: Using AI/ML for security anomaly detection
- π« Email: [email protected]
- πΌ LinkedIn: linkedin.com/in/akifozer
- π¬ Research: Always open to collaboration on security research projects
π‘ "Security through understanding: from high-level applications to low-level assembly, every layer matters."
Thank you for visiting my profile! Feel free to explore my repositories, reach out for collaboration, or connect with me. π


