CTF Player · Security Researcher · Challenge Author

Martin
Rozariyo

I spend a lot of time figuring out how things break. Most of what I know didn't come from a classroom — it came from CTFs, late nights reading writeups, and actually building challenges myself. Focused on digital forensics and cryptography. Authored seven original challenges for L3m0nCTF 2025. Documenting everything as I go.

7
Challenges authored
7+
CTF writeups
2
CTF events

01 — Background

A bit about me

I'm Martin Rozariyo, currently completed my third year of B.Tech. Most of my learning has happened outside of lectures — through CTF competitions, reading security blogs, and trying to break things in controlled environments.

The biggest shift in my understanding came when I started writing challenges instead of just solving them. For L3m0nCTF 2025, I authored seven problems across cryptography and forensics — covering Enigma-style ciphers, PCAP analysis, audio steganography, and frequency-domain techniques. Building things had forced me to think about what actually makes a vulnerability exploitable, not just how to exploit it.

I try to document whatever I learn. My writeups aren’t perfect, and sometimes they take more time than I’d like, but I write them in a way that would have helped me when I was stuck. That habit has made my learning slower, but definitely more solid.

Right now I'm preparing for the PJPT. OSCP is on the roadmap. Eventually I want to work in offensive security — red team or vulnerability research.

Python Linux Wireshark Ghidra Burp Suite Nmap FFT / Signal analysis PCAP forensics Steganography OSINT Bash Cryptanalysis
// quick info
LocationCoimbatore, India
EducationB.Tech, Year 3
Main focusForensics + Crypto
// active on
HackTheBoxActive
TryHackMeActive
GitHubrozariyomartin
// in progress
PJPT certOngoing
OSCPLater goal
Home labBuilding

02 — Capabilities

What I work with

🔬
Digital Forensics
  • PCAP & network traffic analysis
  • Audio forensics & FFT
  • Steganography (LSB, bitplanes)
  • Email & log investigation
  • File carving & metadata
🔐
Cryptography
  • Classical & custom cipher design
  • Enigma / rotor cipher analysis
  • XOR deconstruction
  • Encoding chain analysis
  • CTF crypto challenge authoring
🌐
Web Security
  • Web app pentesting basics
  • Burp Suite interception
  • OWASP Top 10
  • Recon & OSINT
  • API security fundamentals
⚙️
Reverse Engineering
  • Ghidra & static analysis
  • x86 assembly reading
  • DTMF & signal decoding
  • Hardware protocol analysis
  • Binary analysis basics
🐍
Scripting
  • Python — primary language
  • Bash automation
  • CTF tooling & solve scripts
  • Challenge infrastructure
  • Git & version control
🖥️
Systems & Network
  • Linux — daily driver
  • TCP/IP fundamentals
  • Wireshark packet analysis
  • Nmap enumeration
  • HackTheBox machines

03 — Research & CTFs

Writeups & authored challenges


04 — Credentials

Certifications & platforms

In progress
eLearnSecurity
PJPT — Junior Penetration Tester
Entry-level hands-on pentesting cert. Covers enumeration, basic exploitation, and reporting. My first formal cert in offensive security.
Planned
Offensive Security
OSCP
Long-term goal. The industry standard for penetration testing. I'll get there after building more consistent offensive experience through labs and CTFs.

05 — Connect

Get in touch

Happy to connect — seriously.

Whether it's a CTF team looking for a forensics/crypto person, someone who wants to discuss a writeup, or an internship opportunity — feel free to reach out. I try to reply to every message.

Drop me a message