Social Platform
YouTube
Thu Rein Oo Tech
@ThureinooTech

I share my learning notes and answer questions from others on my YouTube channel.

132 Subscribers 165 Videos
youtube.com
Facebook
Ech Tit
@echtit1

I write blogs, share free courses, and post about security, networking, and web development.

624 Likes 1.2K Followers
facebook.com
Medium
Ech Tit
@echtit

I share articles about technology, programming, and personal growth on Medium.

Blog Walkthrough
medium.com
My Projects
Port Scanner

PORT SCANNER WITH PYTHON

Dive into Python coding with a focus on port scanning.

Source Code
Rental Service

RENTAL SERVICE WITH C# LANGUAGE

Nwet Rental rents mini devices. Users order online; admins manage inventory.

Source Code
IP Tracker

IP Address Tracker

IP Address Tracker lets users track IPs/URLs via CLI or web.

Source Code
Malware Sample

Malware Sample

This repo offers an educational .bat file for simple malware creation—great for learning. Dive in and explore!

Source Code
Google Dorking Chrome Extension

Google Dorking Chrome Extension

This tool is created for the cs50x project and still in the process for the daily use.

Source Code
Google Dorking Chrome Extension

2D Adventure Game

I wrote this game using C# and Unity, where players navigate a 2D world, solve puzzles, and defeat enemies.

Source Code
Google Dorking Chrome Extension

Student Management System

This project is Uni project which is using java for more detail read on Github.

Source Code

My Articles & Content

Is 2FA Still Enough in 2025?

DKIM Email Example

We’ve long believed that using two-factor authentication (2FA) was a strong security measure. But now, in 2025, it's time to ask ourselves: Is it still enough?

Phishing techniques have evolved significantly. Today’s phishing emails are hard to detect, even for trained users. Attackers are no longer just tricking users — they’re bypassing technical protections we used to trust.

Recent articles

Forensic Document Examination (FDE): How to Properly Destroy Sensitive Paper Documents
Read on LinkedIn
ShortURL Link Awareness – Scam Alert by Echtit
Read on LinkedIn
Just about Drone Forensics investigation(MM version)
Read on Facebook

Walkthrough

Walkthrough

The Sticker Shop THM walkthrough THM
Read on Medium
Security Footage Walkthrough THM
Read on Medium

Flare DNS Chess Walkthrough

DKIM Email Example

To day I am going to write the walkthrough about the Flare DNS chess CTF

To look the functions which are using in the file, we can use the command which is default in linux ‘readelf’ To debug getNextMove, I first found the offset of 0x11c1 in the output of readelf above.

MY EDUCATION

Degree Icon

TWINKLE UNIVERSITY

I'm Thu Rein Oo, proud to have completed NCC Level 5 in cyber security at Twinkle University. Ready for advanced training and responsibilities.

Degree Icon

Mae Fah Luang University

I am currently studying computer engineering at Mae Fah Luang University. I look forward to expanding my knowledge and skills in this field and continuing my academic journey.