Skip to content
View orgito1015's full-sized avatar

Highlights

  • Pro

Organizations

@Cybersecurity-Enthusiasts-from-42 @TechWithOrgito @JACSE-Journal

Block or report orgito1015

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
orgito1015/README.md
   _____ __ _______ ___                   _                     _____  _____   ___  ______ ____  _____ _____  ___  _____  __ 
  / ____/_ |__   __/ _ \                 | |                   |  __ \|  __ \ / _ \|  ____|___ \| ____| ____|/ _ \|  __ \/_ |
 | |  __ | |  | | | | | |      __ _      | | __       __ _     | |__) | |__) | | | | |__    __) | |__ | |__ | | | | |__) || |
 | | |_ || |  | | | | | |     / _` |     | |/ /      / _` |    |  ___/|  _  /| | | |  __|  |__ <|___ \|___ \| | | |  _  / | |
 | |__| || |  | | | |_| |    | (_| |  _  |   <   _  | (_| |    | |    | | \ \| |_| | |     ___) |___) |___) | |_| | | \ \ | |
  \_____||_|  |_|  \___/      \__,_| (_) |_|\_\ (_)  \__,_|    |_|    |_|  \_\\___/|_|    |____/|____/|____/ \___/|_|  \_\|_|

Profile Views GitHub followers GitHub Stars

GitHub contribution snake

👨‍💻 Orgito Leka

G1t0 · Pr0f3550r1

Cybersecurity Researcher · Software Engineer · Computer Science & 42 Network Student

LinkedIn GitHub HackTheBox TryHackMe


About Me

Cybersecurity-focused software engineer with practical experience in system security, web application security, and low-level programming.

Currently completing the 42 Common Core, with emphasis on C programming, memory management, operating system fundamentals, and secure software design.

Active contributor to open-source ecosystems (Fedora Project) and continuous learner through CTFs, vulnerability research, and hands-on security experimentation.

"Security is not a product, but a process." – Building secure systems through deep understanding and responsible disclosure.


Research Interests

Security Research

  • Vulnerability discovery and root-cause analysis
  • Secure software design and defensive programming
  • Web application attack surfaces
  • Authentication and authorization mechanisms

System Security

  • Linux internals and system hardening
  • Security testing automation
  • Container and cloud security
  • Cryptographic implementations

Cybersecurity Experience

Core Competencies

Offensive Security

  • Network & Web Penetration Testing – Identifying vulnerabilities in web applications and network infrastructure
  • OWASP Top 10 – Practical exploitation and remediation of common web vulnerabilities
  • SQL Injection & XSS – Advanced injection techniques and bypass methods
  • Authentication Bypass – Session management, JWT, OAuth vulnerabilities
  • Security Misconfigurations – Server hardening and secure deployment practices

Defensive Security

  • Linux Hardening – SELinux, AppArmor, iptables, fail2ban
  • Secure Code Review – Static analysis and manual code auditing
  • Security Monitoring – Log analysis, SIEM, intrusion detection
  • Incident Response – Threat detection, forensics, and remediation
  • Threat Modeling – STRIDE, attack trees, risk assessment

CTF & Competitive Security

Active Categories: Web · Crypto · Forensics · OSINT · Reverse Engineering · PWN · Steganography

Notable Achievements

  • Participated in multiple CTF competitions (HTB, THM, PicoCTF)
  • Security writeups and vulnerability disclosures
  • Continuous skill development through practical challenges

Security Research & Projects

  • Vulnerability Assessment – Systematic evaluation of application security posture
  • Exploit Development – Understanding and developing proof-of-concept exploits
  • Security Automation – Python and Bash scripts for security testing
  • Open Source Contributions – Security improvements to public repositories

Technical Arsenal

Security Tools & Frameworks

Penetration Testing & Exploitation
┌─ Web Application Testing
│  ├─ Burp Suite Professional      │ Advanced web vulnerability scanner
│  ├─ OWASP ZAP                    │ Web application security testing
│  ├─ SQLMap                       │ Automated SQL injection exploitation
│  └─ Nikto                        │ Web server scanner
│
┌─ Network Reconnaissance
│  ├─ Nmap                         │ Network discovery and security auditing
│  ├─ Masscan                      │ Fast port scanner
│  ├─ Wireshark                    │ Network protocol analyzer
│  └─ tcpdump                      │ Packet capture and analysis
│
┌─ Exploitation Frameworks
│  ├─ Metasploit Framework         │ Penetration testing framework
│  ├─ Exploit-DB                   │ Vulnerability database
│  └─ SearchSploit                 │ Exploit search tool
│
└─ Password & Hash Cracking
   ├─ Hashcat                      │ Advanced password recovery
   ├─ John the Ripper              │ Password cracking
   └─ Hydra                        │ Network login cracker
🔍 Reverse Engineering & Binary Analysis
  • IDA Free / Ghidra – Disassembler and decompiler
  • GDB / PEDA – Advanced debugging
  • radare2 / Cutter – Binary analysis framework
  • objdump / nm / strings – Binary inspection utilities
  • strace / ltrace – System and library call tracing
🐧 Operating Systems & Environments
  • Kali Linux – Primary penetration testing distribution
  • Fedora – Daily driver and development environment
  • BlackArch – Comprehensive security toolkit
  • Parrot OS – Security and privacy-focused distribution
  • Ubuntu Server – Production and testing environments

💻 Programming & Scripting

Systems Programming

C Language
  ├─ Memory management
  ├─ Systems programming
  ├─ Low-level security
  └─ Buffer overflow analysis

Security Automation

Python 3
  ├─ Exploit development
  ├─ Security tooling
  ├─ Web scraping
  └─ Data analysis

System Administration

• Bash Scripting
  ├─ Linux automation
  ├─ Security hardening
  ├─ Log parsing
  └─ Process monitoring

Technologies

AWS Docker Kubernetes Linux Node.js PyTorch React Redis Spring TensorFlow

Security Frameworks & Methodologies

Framework Focus Area Proficiency
OWASP Testing Guide Web application security testing ⭐⭐⭐⭐⭐
MITRE ATT&CK Threat intelligence and tactics ⭐⭐⭐⭐
NIST Cybersecurity Framework Risk management and security controls ⭐⭐⭐⭐
PTES Penetration testing methodology ⭐⭐⭐⭐
OSSTMM Security testing methodology ⭐⭐⭐

Certifications & Learning Path

Current Certifications

| Current Certifications | https://www.credly.com/users/orgito-leka |

Target Certifications

  • OSCP (Offensive Security Certified Professional)
  • CEH (Certified Ethical Hacker)
  • CompTIA Security+
  • eJPT (eLearnSecurity Junior Penetration Tester)

📖 Continuous Learning

  • 42 Network – Core curriculum with focus on C programming and Unix systems
  • Security Research – Daily vulnerability research and exploit analysis
  • Lab Practice – Dedicated home lab for security testing and research
  • Write-ups & Documentation – Sharing knowledge through technical documentation

📊 GitHub Statistics

GitHub Stats Top Languages GitHub Streak Contribution Graph

Achievements & Highlights

 Active CTF Competitor              OWASP Top 10 Practitioner
 Security Researcher                Open Source Contributor
 Secure Software Developer          42 Network Student
 Linux Security Enthusiast          DevSecOps Advocate

📫 Connect With Me


Join my Discord Community

Platform Link
💬📢 Discord CyberSecurity Enthusiasts

💡 Philosophy

def security_mindset():
    """
    Security is not about making something completely unbreakable,
    but about making the cost of breaking it exceed the value gained.
    """
    principles = {
        'defense_in_depth': True,
        'least_privilege': True,
        'fail_securely': True,
        'security_by_design': True,
        'continuous_learning': True
    }
    
    while True:
        learn()
        practice()
        share_knowledge()
        improve_security()

🔐 "Hack the Planet Responsibly" 🔐

Focused on understanding systems deeply, identifying weaknesses responsibly,
and improving security through sound engineering practices.


Last Updated: January 2026

Made with ❤️ and ☕

Pinned Loading

  1. 42-Common-Core-Progress 42-Common-Core-Progress Public

    A structured and organized tracker for my progress through the 42 Common Core curriculum. Includes project status, evaluations, resources, notes, and solutions to help others follow the journey and…

    C 16

  2. Rust-in-the-Linux-Kernel Rust-in-the-Linux-Kernel Public

    Shell

  3. free-cybersecurity-certifications free-cybersecurity-certifications Public

    In this repository, you will find a collection of free cybersecurity courses, each offering a certificate upon completion.

    1

  4. hacking-books hacking-books Public

    E-books related to hacking helps you to know more about hacking

  5. ipv4-subnet-calculator-c-asm ipv4-subnet-calculator-c-asm Public

    IPv4 Subnet Calculator built with C and x86-64 Assembly, demonstrating low-level TCP/IP subnetting and systems programming principles.

    C