Cyber Security and Digital Forensics enthusiast. My journey involves deep diving into security tools, learning AI models, and building web applications to enhance data protection and threat analysis.
I am Eman Fatima, a dedicated professional in the realm of Cyber Security and Digital Forensics. Based in Rahim Yar Khan, Pakistan, my focus is on fortifying digital infrastructures and discovering insights hidden within complex data structures.
My technical background bridges several domains:
Whether it's deploying phishing detection platforms or crafting steganography utilities, I thrive on solving intricate technical challenges. Let's collaborate to build something secure and innovative.
Coursera
Coursera
Coursera
Enhancing healthcare security of hospital management systems implementing Blockchain and AI-based anomaly detection to prevent unauthorized access and data breaches.
A web-based platform designed to secure audio files and detect digital tampering using advanced AI models like Whisper for accurate forensic analysis.
Detects traffic flow and recognizes traffic patterns using AI. Trained on the German Kaggle dataset to predict and classify traffic signs efficiently.
A full-stack platform detecting phishing attacks across URLs and emails. Uses ML for URL extraction, NLP for email analysis, and WHOIS/DNS lookups to calculate risk scores.
Deep learning classifier for Cat vs Dog using a CNN. Applies a confidence threshold (e.g., 85%+) to ensure strict classification accuracy.
Records user audio to evaluate pronunciation accuracy. Uses OpenAI Whisper and Wav2Vec2 to perform phoneme-level audio analysis and detect reciter styles.
A comprehensive cybersecurity tool designed to audit password strength, enforce policy requirements, and verify credentials against known breached password databases safely.
A robust, lightweight network port scanner engineered for rapid discovery of open ports, live hosts, and active network services during reconnaissance phases.
A digital forensics utility that extracts hidden metadata from documents, images, and other file types, exposing EXIF data, authors, and creation timelines.
A fast cryptographic hashing utility providing multi-algorithm checksum generation and verification to ensure robust data integrity across file transfers.
An advanced steganography tool capable of invisibly concealing encrypted text and file payloads within standard image files, and retrieving them securely.
A memory forensics scanner that parses and extracts readable ASCII and Unicode strings from application memory dumps, aiding in malware analysis.