Skip to content
Draft
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
109 changes: 109 additions & 0 deletions profile/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,109 @@
# Tech with Orgito

### Advancing Cybersecurity Through Open Research and Education

---

## About

Tech with Orgito is a cybersecurity-focused organization dedicated to advancing security research, developing practical tooling, and fostering knowledge sharing within the information security community. We bridge the gap between theoretical security concepts and real-world application through rigorous research, hands-on experimentation, and comprehensive educational resources.

Our mission is to contribute to the collective security knowledge base by producing high-quality, open-source security tools and research that empowers security professionals, researchers, and enthusiasts to better understand and address modern cybersecurity challenges.

## Focus Areas

### Cybersecurity Research
We conduct in-depth security research across multiple domains including network security, application security, cryptography, and emerging threat landscapes. Our research methodology emphasizes practical validation and real-world applicability.

### Open-Source Security Tools
Development and maintenance of security tools designed to assist penetration testers, security researchers, and defensive security teams. All tools are released under open-source licenses to ensure transparency and community collaboration.

### Capture The Flag (CTF) Competitions
Active participation in and creation of CTF challenges across various categories including web exploitation, binary exploitation, reverse engineering, cryptography, and forensics. We share writeups, methodologies, and learning resources from our CTF experiences.

### Security Tooling & Automation
Building automated security testing frameworks, vulnerability scanners, and defensive security solutions that can be integrated into modern development and security operations workflows.

### Education & Knowledge Sharing
Creating comprehensive tutorials, technical documentation, vulnerability analyses, and educational content aimed at helping others develop practical cybersecurity skills. We prioritize clear explanations and reproducible demonstrations.

## Repositories

Our repositories span multiple areas of cybersecurity:

**Security Tools**: Practical utilities for security testing, analysis, and automation

**Research Projects**: Proof-of-concept implementations, security research experiments, and vulnerability demonstrations

**CTF Resources**: Challenge writeups, training materials, and educational content from CTF competitions

**Documentation**: Security guides, best practices, and technical reference materials

Browse our repositories to explore current projects, contribute to ongoing work, or utilize our tools in your security workflows.

## Contributing

We welcome contributions from the security community. Whether you're interested in submitting bug reports, proposing new features, improving documentation, or contributing code, your input is valuable.

### Guidelines

- Review existing issues and pull requests before starting new work
- Follow secure coding practices and conduct thorough testing
- Include clear documentation for new features or tools
- Maintain professional and constructive communication
- Respect responsible disclosure practices for security issues

### Pull Request Process

1. Fork the repository and create a feature branch
2. Make your changes with clear, descriptive commit messages
3. Test your changes thoroughly
4. Update relevant documentation
5. Submit a pull request with a comprehensive description of your changes

## Responsible Disclosure & Security Ethics

Security research must be conducted ethically and responsibly. We adhere to strict ethical guidelines:

### Security Vulnerability Disclosure

If you discover a security vulnerability in any of our projects:

- Do not publicly disclose the vulnerability until it has been addressed
- Contact us privately with detailed information about the vulnerability
- Allow reasonable time for investigation and remediation
- Work collaboratively with maintainers to verify fixes

### Research Ethics

- Obtain proper authorization before testing systems you do not own
- Respect privacy and data protection laws
- Conduct research in isolated, controlled environments when possible
- Do not cause harm or disruption to production systems
- Follow responsible disclosure practices for discovered vulnerabilities

### Legal Compliance

All security research and tool usage must comply with applicable laws and regulations. Users are responsible for ensuring their activities are legally authorized.

## Community

### Orgito Leka

Tech with Orgito is founded and maintained by Orgito Leka, a cybersecurity researcher and educator with a focus on practical security research, tool development, and community knowledge sharing.

### Connect & Collaborate

We believe in the power of community-driven security research. Connect with us to discuss security topics, share insights, or collaborate on research projects.

## Links

- Website: [Coming Soon]
- Blog: [Coming Soon]
- Twitter: [Coming Soon]
- LinkedIn: [Coming Soon]
- Contact: [Coming Soon]

---

**Note**: This organization's projects are provided for educational and research purposes. Users are responsible for ensuring their use of these tools and resources complies with all applicable laws and regulations.