Skip to content
View orgito1015's full-sized avatar

Highlights

  • Pro

Organizations

@Cybersecurity-Enthusiasts-from-42 @TechWithOrgito @JACSE-Journal

Block or report orgito1015

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
orgito1015/README.md
   _____ __ _______ ___                   _                     _____  _____   ___  ______ ____  _____ _____  ___  _____  __ 
  / ____/_ |__   __/ _ \                 | |                   |  __ \|  __ \ / _ \|  ____|___ \| ____| ____|/ _ \|  __ \/_ |
 | |  __ | |  | | | | | |      __ _      | | __       __ _     | |__) | |__) | | | | |__    __) | |__ | |__ | | | | |__) || |
 | | |_ || |  | | | | | |     / _` |     | |/ /      / _` |    |  ___/|  _  /| | | |  __|  |__ <|___ \|___ \| | | |  _  / | |
 | |__| || |  | | | |_| |    | (_| |  _  |   <   _  | (_| |    | |    | | \ \| |_| | |     ___) |___) |___) | |_| | | \ \ | |
  \_____||_|  |_|  \___/      \__,_| (_) |_|\_\ (_)  \__,_|    |_|    |_|  \_\\___/|_|    |____/|____/|____/ \___/|_|  \_\|_|

Profile Views GitHub followers GitHub Stars

GitHub contribution snake

👨‍💻 Orgito Leka

G1t0 · Pr0f3550r1

Cybersecurity Researcher · Software Engineer · Computer Science & 42 Network Student

LinkedIn GitHub HackTheBox TryHackMe


About Me

Cybersecurity-focused software engineer with practical experience in system security, web application security, and low-level programming.

Currently completing the 42 Common Core, with emphasis on C programming, memory management, operating system fundamentals, and secure software design.

Active contributor to open-source ecosystems (Fedora Project) and continuous learner through CTFs, vulnerability research, and hands-on security experimentation.

"Security is not a product, but a process." – Building secure systems through deep understanding and responsible disclosure.


Founded Organizations

Organizations I have created and actively maintain on GitHub:

Organization Description Link
JACSE Journal of Applied Cybersecurity & Systems Engineering https://github.com/JACSE-Journal
Tech With Orgito Exploring and sharing the best in cybersecurity—tools, articles, books, and more! https://github.com/TechWithOrgito
Cybersecurity Enthusiasts from 42 Cybersecurity Community https://github.com/Cybersecurity-Enthusiasts-from-42

Note: This section displays only organizations where I am the founder and creator,
not organizations where I am merely a member or contributor.


Research Interests

Security Research

Focused on vulnerability discovery through systematic root-cause analysis and secure software architecture using defensive programming principles. Specialized in web application security, analyzing authentication/authorization mechanisms and strengthening them against emerging threats.

System Security

Working with Linux internals to implement system hardening strategies and develop automated security testing frameworks. Experience spans container and cloud security architectures, with practical cryptographic implementations for secure system design.


Cybersecurity Experience

Core Competencies

Offensive Security

Network & Web Penetration Testing - Identifying critical vulnerabilities in web applications and network infrastructure

  • OWASP Top 10 exploitation and remediation
  • Advanced SQL Injection & XSS techniques with bypass methods
  • Authentication Bypass - Session management, JWT, and OAuth vulnerabilities
  • Security Misconfigurations - Server hardening and secure deployment

Defensive Security

  • Linux Hardening - SELinux, AppArmor, iptables, and fail2ban configurations
  • Secure Code Review - Static analysis and manual code auditing
  • Security Monitoring - Log analysis, SIEM integration, and intrusion detection
  • Incident Response - Threat detection, forensics, and remediation
  • Threat Modeling - STRIDE, attack trees, and risk assessment

CTF & Competitive Security

Active Categories: Web · Crypto · Forensics · OSINT · Reverse Engineering · PWN · Steganography

Notable Achievements

Active participant in CTF competitions on platforms like HTB, THM, and PicoCTF. Contributing through detailed security writeups and responsible vulnerability disclosures, with continuous skill development through practical challenges.

Security Research & Projects

  • Vulnerability Assessment - Systematic evaluation of application security postures
  • Exploit Development - Creating proof-of-concept exploits to demonstrate security weaknesses
  • Security Automation - Custom Python and Bash scripts for security testing
  • Open Source Contributions - Security improvements to public repositories

Technical Arsenal

Security Tools & Frameworks

Penetration Testing & Exploitation
┌─ Web Application Testing
│  ├─ Burp Suite Professional      │ Advanced web vulnerability scanner
│  ├─ OWASP ZAP                    │ Web application security testing
│  ├─ SQLMap                       │ Automated SQL injection exploitation
│  └─ Nikto                        │ Web server scanner
│
┌─ Network Reconnaissance
│  ├─ Nmap                         │ Network discovery and security auditing
│  ├─ Masscan                      │ Fast port scanner
│  ├─ Wireshark                    │ Network protocol analyzer
│  └─ tcpdump                      │ Packet capture and analysis
│
┌─ Exploitation Frameworks
│  ├─ Metasploit Framework         │ Penetration testing framework
│  ├─ Exploit-DB                   │ Vulnerability database
│  └─ SearchSploit                 │ Exploit search tool
│
└─ Password & Hash Cracking
   ├─ Hashcat                      │ Advanced password recovery
   ├─ John the Ripper              │ Password cracking
   └─ Hydra                        │ Network login cracker
🔍 Reverse Engineering & Binary Analysis

My reverse engineering toolkit centers around powerful disassemblers and decompilers like IDA Free / Ghidra for deep binary analysis. I leverage GDB / PEDA for advanced debugging sessions, while radare2 / Cutter provides comprehensive binary analysis capabilities. My workflow includes essential utilities like objdump / nm / strings for binary inspection, complemented by strace / ltrace for tracing system and library calls.

🐧 Operating Systems & Environments

My operational environment spans multiple specialized Linux distributions, each serving a unique purpose. Kali Linux serves as my primary penetration testing distribution, while Fedora powers my daily driver and development workflow. For comprehensive security work, I utilize BlackArch with its extensive security toolkit, complemented by Parrot OS for privacy-focused security operations. Ubuntu Server rounds out my infrastructure for production and testing environments.

💻 Programming & Scripting

Systems Programming

C Language
  ├─ Memory management
  ├─ Systems programming
  ├─ Low-level security
  └─ Buffer overflow analysis

Security Automation

Python 3
  ├─ Exploit development
  ├─ Security tooling
  ├─ Web scraping
  └─ Data analysis

System Administration

• Bash Scripting
  ├─ Linux automation
  ├─ Security hardening
  ├─ Log parsing
  └─ Process monitoring

Technologies

AWS Docker Kubernetes Linux Node.js PyTorch React Redis Spring TensorFlow

Security Frameworks & Methodologies

Framework Focus Area Proficiency
OWASP Testing Guide Web application security testing ⭐⭐⭐⭐⭐
MITRE ATT&CK Threat intelligence and tactics ⭐⭐⭐⭐
NIST Cybersecurity Framework Risk management and security controls ⭐⭐⭐⭐
PTES Penetration testing methodology ⭐⭐⭐⭐
OSSTMM Security testing methodology ⭐⭐⭐

Certifications & Learning Path

Current Certifications

| Current Certifications | https://www.credly.com/users/orgito-leka |

Target Certifications

On my professional development roadmap, I'm pursuing industry-recognized certifications including the OSCP (Offensive Security Certified Professional) for advanced penetration testing mastery, CEH (Certified Ethical Hacker) to formalize my ethical hacking expertise, CompTIA Security+ as a foundational security certification, and eJPT (eLearnSecurity Junior Penetration Tester) to validate my practical penetration testing skills.

📖 Continuous Learning

My learning journey is centered around the 42 Network core curriculum with deep focus on C programming and Unix systems. I engage in daily security research involving vulnerability analysis and exploit study. My dedicated home lab environment serves as a testing ground for security research and experimentation, while I actively contribute to the security community through detailed write-ups and technical documentation that helps others learn from my discoveries.


📊 GitHub Statistics

GitHub Stats Top Languages GitHub Streak Contribution Graph

Achievements & Highlights

 Active CTF Competitor              OWASP Top 10 Practitioner
 Security Researcher                Open Source Contributor
 Secure Software Developer          42 Network Student
 Linux Security Enthusiast          DevSecOps Advocate

📫 Connect With Me


Join my Discord Community

Platform Link
💬📢 Discord CyberSecurity Enthusiasts

💡 Philosophy

def security_mindset():
    """
    Security is not about making something completely unbreakable,
    but about making the cost of breaking it exceed the value gained.
    """
    principles = {
        'defense_in_depth': True,
        'least_privilege': True,
        'fail_securely': True,
        'security_by_design': True,
        'continuous_learning': True
    }
    
    while True:
        learn()
        practice()
        share_knowledge()
        improve_security()

🔐 "Hack the Planet Responsibly" 🔐

Focused on understanding systems deeply, identifying weaknesses responsibly,
and improving security through sound engineering practices.


Last Updated: January 2026

Made with ❤️ and ☕

Pinned Loading

  1. 42-Common-Core-Progress 42-Common-Core-Progress Public

    A structured and organized tracker for my progress through the 42 Common Core curriculum. Includes project status, evaluations, resources, notes, and solutions to help others follow the journey and…

    C 14

  2. Rust-in-the-Linux-Kernel Rust-in-the-Linux-Kernel Public

    Rust

  3. free-cybersecurity-certifications free-cybersecurity-certifications Public

    In this repository, you will find a collection of free cybersecurity courses, each offering a certificate upon completion.

    1

  4. hacking-books hacking-books Public

    E-books related to hacking helps you to know more about hacking

  5. ipv4-subnet-calculator-c-asm ipv4-subnet-calculator-c-asm Public

    IPv4 Subnet Calculator built with C and x86-64 Assembly, demonstrating low-level TCP/IP subnetting and systems programming principles.

    C