Martin
Rozariyo
I spend a lot of time figuring out how things break. Most of what I know didn't come from a classroom — it came from CTFs, late nights reading writeups, and actually building challenges myself. Focused on digital forensics and cryptography. Authored seven original challenges for L3m0nCTF 2025. Documenting everything as I go.
01 — Background
A bit about me
I'm Martin Rozariyo, currently completed my third year of B.Tech. Most of my learning has happened outside of lectures — through CTF competitions, reading security blogs, and trying to break things in controlled environments.
The biggest shift in my understanding came when I started writing challenges instead of just solving them. For L3m0nCTF 2025, I authored seven problems across cryptography and forensics — covering Enigma-style ciphers, PCAP analysis, audio steganography, and frequency-domain techniques. Building things had forced me to think about what actually makes a vulnerability exploitable, not just how to exploit it.
I try to document whatever I learn. My writeups aren’t perfect, and sometimes they take more time than I’d like, but I write them in a way that would have helped me when I was stuck. That habit has made my learning slower, but definitely more solid.
Right now I'm preparing for the PJPT. OSCP is on the roadmap. Eventually I want to work in offensive security — red team or vulnerability research.
02 — Capabilities
What I work with
- PCAP & network traffic analysis
- Audio forensics & FFT
- Steganography (LSB, bitplanes)
- Email & log investigation
- File carving & metadata
- Classical & custom cipher design
- Enigma / rotor cipher analysis
- XOR deconstruction
- Encoding chain analysis
- CTF crypto challenge authoring
- Web app pentesting basics
- Burp Suite interception
- OWASP Top 10
- Recon & OSINT
- API security fundamentals
- Ghidra & static analysis
- x86 assembly reading
- DTMF & signal decoding
- Hardware protocol analysis
- Binary analysis basics
- Python — primary language
- Bash automation
- CTF tooling & solve scripts
- Challenge infrastructure
- Git & version control
- Linux — daily driver
- TCP/IP fundamentals
- Wireshark packet analysis
- Nmap enumeration
- HackTheBox machines
03 — Research & CTFs
Writeups & authored challenges
04 — Credentials
Certifications & platforms
05 — Connect
Get in touch
Happy to connect — seriously.
Whether it's a CTF team looking for a forensics/crypto person, someone who wants to discuss a writeup, or an internship opportunity — feel free to reach out. I try to reply to every message.