From 46ea7837e1ec558c781f441ddbaa483f61cecfaa Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Sat, 10 Jan 2026 00:38:04 +0000 Subject: [PATCH 1/2] Initial plan From 26eefb95f7e59d688fff8eb9bf77589d311f4738 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Sat, 10 Jan 2026 00:40:42 +0000 Subject: [PATCH 2/2] Create organization profile README for Tech with Orgito Co-authored-by: orgito1015 <86354243+orgito1015@users.noreply.github.com> --- profile/README.md | 109 ++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 109 insertions(+) create mode 100644 profile/README.md diff --git a/profile/README.md b/profile/README.md new file mode 100644 index 0000000..a3d94ee --- /dev/null +++ b/profile/README.md @@ -0,0 +1,109 @@ +# Tech with Orgito + +### Advancing Cybersecurity Through Open Research and Education + +--- + +## About + +Tech with Orgito is a cybersecurity-focused organization dedicated to advancing security research, developing practical tooling, and fostering knowledge sharing within the information security community. We bridge the gap between theoretical security concepts and real-world application through rigorous research, hands-on experimentation, and comprehensive educational resources. + +Our mission is to contribute to the collective security knowledge base by producing high-quality, open-source security tools and research that empowers security professionals, researchers, and enthusiasts to better understand and address modern cybersecurity challenges. + +## Focus Areas + +### Cybersecurity Research +We conduct in-depth security research across multiple domains including network security, application security, cryptography, and emerging threat landscapes. Our research methodology emphasizes practical validation and real-world applicability. + +### Open-Source Security Tools +Development and maintenance of security tools designed to assist penetration testers, security researchers, and defensive security teams. All tools are released under open-source licenses to ensure transparency and community collaboration. + +### Capture The Flag (CTF) Competitions +Active participation in and creation of CTF challenges across various categories including web exploitation, binary exploitation, reverse engineering, cryptography, and forensics. We share writeups, methodologies, and learning resources from our CTF experiences. + +### Security Tooling & Automation +Building automated security testing frameworks, vulnerability scanners, and defensive security solutions that can be integrated into modern development and security operations workflows. + +### Education & Knowledge Sharing +Creating comprehensive tutorials, technical documentation, vulnerability analyses, and educational content aimed at helping others develop practical cybersecurity skills. We prioritize clear explanations and reproducible demonstrations. + +## Repositories + +Our repositories span multiple areas of cybersecurity: + +**Security Tools**: Practical utilities for security testing, analysis, and automation + +**Research Projects**: Proof-of-concept implementations, security research experiments, and vulnerability demonstrations + +**CTF Resources**: Challenge writeups, training materials, and educational content from CTF competitions + +**Documentation**: Security guides, best practices, and technical reference materials + +Browse our repositories to explore current projects, contribute to ongoing work, or utilize our tools in your security workflows. + +## Contributing + +We welcome contributions from the security community. Whether you're interested in submitting bug reports, proposing new features, improving documentation, or contributing code, your input is valuable. + +### Guidelines + +- Review existing issues and pull requests before starting new work +- Follow secure coding practices and conduct thorough testing +- Include clear documentation for new features or tools +- Maintain professional and constructive communication +- Respect responsible disclosure practices for security issues + +### Pull Request Process + +1. Fork the repository and create a feature branch +2. Make your changes with clear, descriptive commit messages +3. Test your changes thoroughly +4. Update relevant documentation +5. Submit a pull request with a comprehensive description of your changes + +## Responsible Disclosure & Security Ethics + +Security research must be conducted ethically and responsibly. We adhere to strict ethical guidelines: + +### Security Vulnerability Disclosure + +If you discover a security vulnerability in any of our projects: + +- Do not publicly disclose the vulnerability until it has been addressed +- Contact us privately with detailed information about the vulnerability +- Allow reasonable time for investigation and remediation +- Work collaboratively with maintainers to verify fixes + +### Research Ethics + +- Obtain proper authorization before testing systems you do not own +- Respect privacy and data protection laws +- Conduct research in isolated, controlled environments when possible +- Do not cause harm or disruption to production systems +- Follow responsible disclosure practices for discovered vulnerabilities + +### Legal Compliance + +All security research and tool usage must comply with applicable laws and regulations. Users are responsible for ensuring their activities are legally authorized. + +## Community + +### Orgito Leka + +Tech with Orgito is founded and maintained by Orgito Leka, a cybersecurity researcher and educator with a focus on practical security research, tool development, and community knowledge sharing. + +### Connect & Collaborate + +We believe in the power of community-driven security research. Connect with us to discuss security topics, share insights, or collaborate on research projects. + +## Links + +- Website: [Coming Soon] +- Blog: [Coming Soon] +- Twitter: [Coming Soon] +- LinkedIn: [Coming Soon] +- Contact: [Coming Soon] + +--- + +**Note**: This organization's projects are provided for educational and research purposes. Users are responsible for ensuring their use of these tools and resources complies with all applicable laws and regulations.