Hello, I am

Ata Hakçıl

Lead Machine Learning Engineer · Security Researcher & Consultant · Strategic Technology Consultant

Ata Hakçıl

Who am I?

Mad scientist turned builder. I break things, and increasingly make them. I work at the intersection of Machine Learning and Security — from physics-inspired neural networks and diffusion models to exploit development, reverse engineering and cryptography. Lifetime CTF player and passionate flag collector.

Services

  • • Machine Learning Consulting
  • • LLM Integration & Optimization
  • • Security Advisory
  • • Penetration Testing
  • • Forensic Analysis
  • • CTF Challenge Authoring

Experience

Lead Machine Learning Engineer — Cassiel.ai (Remote)

2025 – Ongoing

Integrating ML into a digital marketing pipeline

Cybersecurity Consultant — ExpressVPN (Remote)

2025 – Ongoing

Chief technical consultant for ExpressVPN blogs; authored and reviewed cybersecurity articles; ensured technical accuracy.

Strategic Technology Consultant — Webselenese (Remote)

2024 – Ongoing

Led a small team building internal workflow tools; optimized and integrated LLMs for strategic use.

Security Researcher / Security Architect — Webselenese

2020 – 2024

Discovered attack vectors; disclosed data leaks; performed security audits; developed security tooling.

Security Intern — Savunma Teknolojileri Mühendislik A.Ş.

2020

Participated in a penetration test for an airline; authored cybersecurity challenges for STMCTF2020.

Security Penetration Tester — Freelancer

2019 – 2020

Bug bounty and private contracts; delivered security and digital forensics solutions.

CTO & DevOps Engineer — Viper Technologies R&D (UK/Cyprus)

2018 – 2019

Managed development workflows; led web projects; implemented and maintained CI/CD.

Embedded Technologies Developer — Freelancer

2016 – 2018

Designed IoT-based embedded systems for industrial use; focused on workflow tracking and productivity.

Research Interests

Physics-Inspired ML

Structure-preserving models for scientific systems and dynamics.

  • Hamiltonian & Lagrangian Neural Networks
  • Liquid Time-Constant Networks
  • Graph & Hyperbolic Neural Networks

Generative & Foundation Models

Large-scale modeling and controllable generation.

  • Transformers (BERT, GPT, ViT)
  • Diffusion models, Flow Matching, ControlNet, DreamBooth
  • Fine-tuning (LoRA/QLoRA/DoRA), DPO

Security & RE

Vulnerability research and automated analysis.

  • Reverse engineering & binary exploitation
  • Realtime deobfuscation with interpreter-assisted analysis
  • Password analytics with Markov models
  • Applied cryptography & post-quantum primitives

Skills

Programming Languages

C C++ C# Python Java JavaScript TypeScript PHP Go Haskell Lex CUDA Bash Powershell Vala Assembly (x86/ARM/MIPS/AVR) SQL LaTeX Typescript

Practices & Tools

  • Version Control (Git), unit testing, agile, design patterns
  • Databases: MySQL/MariaDB, PostgreSQL, MongoDB, ELK, CouchDB
  • Containerization: Docker
  • Linux in production, CI/CD pipelines, systemd

Systems & Hardware

  • Embedded systems & microprocessors design
  • Computer Organization & CPU design
  • Logic Design

Networking

  • Wireless Comms, packet capture (tcpdump/Wireshark)
  • Protocol reverse engineering

Cybersecurity

  • Reverse Engineering: static (Ghidra, IDA), dynamic; debuggers (gdb/x64dbg) on x86/ARM; .NET and Java bytecode; deobfuscation
  • Penetration Testing: web, network, and cloud; Active Directory; post-exploitation (Linux/Windows); OSINT
  • Binary Exploitation: stack BOF, ROP/ret2*, heap (ptmalloc/tcache), mitigations (ASLR/NX/PIE/RELRO); basic browser/sandbox escapes
  • Cryptography: best practices, PKI, symmetric primitives, hashing, key exchange, TLS, homomorphic, post-quantum, differential cryptanalysis
  • Forensic Analysis & IR: disk/memory forensics, timeline and log analysis, malware triage
  • Threat Modeling & AppSec: secure code review, SAST/DAST, supply chain security
  • Cloud & Container Security: AWS/Azure/GCP, Docker/Kubernetes, IAM, secrets management
  • Detection & Monitoring: SIEM/ELK, network defense, packet capture (tcpdump/Wireshark), threat hunting
  • Vulnerability Management: scanning, prioritization, and remediation workflows
  • Reporting & Communication: clear, actionable findings with remediation guidance

Machine Learning

  • Supervised & Unsupervised: regression, classification, clustering (K‑Means, DBSCAN), dimensionality reduction (PCA, t‑SNE, UMAP), anomaly detection
  • Neural Networks: feedforward, CNNs, RNNs/LSTM, attention mechanisms, Neural ODEs
  • Physics‑Inspired Architectures (emphasis): Hamiltonian Neural Networks (HNN) and Lagrangian Neural Networks (LNN), Liquid Time‑Constant Networks, Graph Neural Networks (GNNs), Hyperbolic NNs; structure‑preserving inductive biases, symplectic integrators
  • Transformer Architectures: BERT, GPT, ViT, encoder‑decoder models, self/multi‑head attention, positional encoding
  • Diffusion Models: DDPM, Stable Diffusion, Flow Matching, score‑based generative modeling, ControlNet, DreamBooth
  • Fine‑Tuning & Custom Training: LoRA/QLoRA/DoRA, PEFT, prompt tuning, adapters, hyperparameter tuning, RLHF/DPO
  • Adversarial Robustness: adversarial training (FGSM, PGD), robustness evaluation, certified defenses, data poisoning defenses
  • Supporting Tools & Optimization: CUDA acceleration, ONNX export, quantization, pruning, compression, dataset curation/augmentation, image generation pipelines, prompt engineering, experiment tracking (MLflow, Weights & Biases)
  • Theoretical Foundations: Differential & Kähler geometry, variational inference, functional analysis, probability & measure theory, optimization (convex/non‑convex), topology, statistical learning theory, quantum information

Languages

Turkish — Native English — Fluent French — Proficient Spanish — Intermediate

Notable Public Projects

Markopy

GitHub →

Hidden Markov Models trained on leaked passwords for Markov-enhanced cracking.

C++PythonCUDA

PWDB

GitHub →

Statistical study on 1B leaked credentials; datasets for research.

PythonSQL

Puff

GitHub →

Puppeteer-powered client-side reflected XSS scanner.

Node.js

spotify-sync

GitHub →

Synchronize programmable RGB devices to Spotify audio and metadata.

Python

CVE-2025-6218

GitHub →

Public PoC and comprehensive test kit for RAR archive vulnerability.

Python

CVE-2023-38831-RaRCE

GitHub →

Exploit tooling and PoC for WinRAR RCE (RaRCE).

Python

CudaMD5

GitHub →

CUDA-powered PHP type-juggle payload generator for MD5 hashes.

CUDA

MetuNCC-VR-Project

C#

3D modeling and virtualization of METU Northern Cyprus Campus.

Accomplishments

  • • STMCTF 2022 — 1st place
  • • HTB UniCTF finalist — 2022
  • • Metasploit Community CTF 2022 — 1st place
  • • BTK Siber Yıldız — 2nd place (2020)
  • • Metasploit Community CTF 2020 — 2nd place
  • • DEFCON 2020 CTF Qualifier — Finalist
  • • InfernoCTF 2019 — 1st place
  • • RITSEC 2019 — 2nd place
  • • UTCTF 2020 — 2nd place
  • • Hackistanbul 2019 (online) — 2nd place
  • • STMCTF 2019 (online) — 3rd place
  • • BTK Siber Yıldız — Finalist (2019)

Other Highlights

  • • Co-founded METU HackTheBox Community (2018)
  • • One of three with the rare "Exploit Maker" badge on HackTheBox
  • • CTF Challenge Author: STMCTF 2020, InCTF 2020, HTB × TMHC 2019

Notable Disclosures

Bing Search Engine Data Breach

Uncovered a Microsoft server leak exposing 6.5TB of user data from Bing products.

Coverage →

Moodle Persistent XSS

Persistent XSS capable of RCE in Moodle (used by 170k+ institutions).

CVE-2020-27419, CVE-2021-20186

ManageEngine ServiceDesk Auth Bypass → PrivEsc

Auth bypass leading to code execution as NT AUTHORITY/SYSTEM.

CVE-2019-10008

Services

Machine Learning Consulting

Model selection, training pipelines, evals, MLOps, and deployment.

LLM Integration & Optimization

RAG, tooling, fine-tuning (LoRA/QLoRA), latency/throughput optimization.

Security Advisory

Threat modeling, crypto and web security reviews, and risk analysis.

Penetration Testing

Actionable findings across web, network, and cloud scopes.

Forensic Analysis

Incident response via log, memory, and disk image analysis.

CTF Authoring

Reverse, pwn, crypto, and web challenges for competitions.

Education

Master's in Computer Engineering — Middle East Technical University NCC

2021 – 2025

Dismissed (ask me how)

B.S. in Computer Engineering — Middle East Technical University NCC

2016 – 2021

Get in touch

Contact

Availability

Open to consulting and research collaborations in ML and Security.

Say hello