Skip to content
@TechWithOrgito

Tech With Orgito

Exploring and sharing the best in cybersecurity—tools, articles, books, and more!

Tech with Orgito

Building security tools and sharing knowledge to strengthen the cybersecurity community.

About

Tech with Orgito is a cybersecurity-focused organization dedicated to advancing information security through practical research, open-source tool development, and community education. We explore real-world security challenges, develop solutions, and share findings to help security professionals and enthusiasts strengthen their skills and defenses.

Our work spans offensive and defensive security, with emphasis on hands-on learning and reproducible research. We believe in transparency, responsible disclosure, and contributing to the broader security ecosystem.

Focus Areas

Cybersecurity Research

Deep dives into vulnerabilities, exploitation techniques, and defense mechanisms. We document findings and methodologies to contribute to the collective understanding of security challenges.

Capture The Flag (CTF)

Active participation in CTF competitions and creation of challenge content. We develop write-ups, walkthroughs, and educational materials to help others learn through practical exercises.

Security Tooling

Development of open-source tools for penetration testing, vulnerability assessment, automation, and security operations. Our tools aim to solve real problems faced by security practitioners.

Education & Knowledge Sharing

Technical tutorials, blog posts, and documentation covering security concepts, techniques, and best practices. We prioritize clarity and practical applicability in all educational content.

Repositories

Our repositories contain security tools, research projects, CTF solutions, and educational resources. Each repository includes documentation on usage, installation, and contribution guidelines. Projects range from specialized utilities to comprehensive frameworks designed for various security testing scenarios.

Key repository categories:

  • Security Tools: Automated scanners, exploitation frameworks, and analysis utilities
  • CTF Write-ups: Detailed solutions and methodologies from competitions
  • Research Projects: Proof-of-concept code and experimental security tools
  • Educational Resources: Learning materials, reference guides, and tutorials

Contributing

We welcome contributions from the security community. Whether you're fixing bugs, adding features, improving documentation, or sharing ideas, your input helps strengthen our projects.

How to Contribute

  1. Fork the repository you want to contribute to
  2. Create a feature branch for your changes
  3. Make your modifications with clear, descriptive commits
  4. Test your changes thoroughly
  5. Submit a pull request with a detailed description of your work

Please ensure your contributions:

  • Follow existing code style and conventions
  • Include appropriate documentation
  • Add tests where applicable
  • Respect the project's license terms

For significant changes, open an issue first to discuss your proposal with maintainers.

Responsible Disclosure & Ethics

Security research must be conducted responsibly and ethically. We are committed to:

Responsible Disclosure

  • Report vulnerabilities privately to affected vendors before public disclosure
  • Allow reasonable time for vendors to develop and deploy patches
  • Coordinate disclosure timelines when appropriate
  • Provide sufficient detail for remediation without enabling malicious exploitation

Ethical Guidelines

  • Obtain proper authorization before testing systems
  • Respect privacy and data protection laws
  • Do not cause harm or disruption to systems or users
  • Use tools and techniques only for legitimate security research and authorized testing
  • Comply with applicable laws and regulations in all jurisdictions

Our tools and research are provided for educational purposes and authorized security testing only. Users are responsible for ensuring their activities comply with all applicable laws and regulations.

About the Author

Orgito Leka is a cybersecurity researcher and practitioner with focus on offensive security, tool development, and security education. Through Tech with Orgito, he shares research findings, develops open-source security tools, and contributes to the information security community.

Orgito's work emphasizes practical security knowledge, hands-on learning approaches, and building tools that solve real-world security challenges. He actively participates in CTF competitions, security research, and knowledge sharing to help others develop their security skills.

Connect

  • Website: [Coming Soon]
  • Blog: [Coming Soon]
  • Twitter/X: [Coming Soon]
  • LinkedIn: [Coming Soon]
  • Email: [Coming Soon]

For questions, suggestions, or collaboration opportunities, please open an issue in the relevant repository or reach out through the channels listed above.

Popular repositories Loading

  1. .github .github Public

  2. rust-in-the-linux-kernel rust-in-the-linux-kernel Public

    Shell

Repositories

Showing 2 of 2 repositories

Top languages

Loading…

Most used topics

Loading…