Camera Tracking System
- Track camera locations in real-time on a map.
- Read and stream images from network cameras.
Hello, I'm
Passionate Full Stack Developer with 5+ years of experience building web and desktop applications.
Welcome! I'm Naruenat Komoot, a passionate developer and tech enthusiast.
I'm a developer with a passion for creating innovative solutions. My expertise spans Web Application and Desktop Application development, and I'm always eager to adopt new technologies.
ALTR (EXIM Bank project)
Delta Electronics Thailand
PPA Innovation
Delta Electronics Thailand
Thai-Nichi Institute of Technology
An Analysis of Electronic Circuits Diagram Using Computer Vision Techniques.
Rajamangala University of Technology Isan Khon Kaen Campus
TV Digital Antenna (Microstrip)
Interactive demos showcasing full-stack developer knowledge — spanning APIs, authentication, real-time systems, database design, and web security.
End-to-end application development
Complete web applications from database schema to polished UI, built with modern frameworks and clean architecture.
Scalable API architecture
Well-structured, documented REST APIs with proper status codes, authentication, and versioning strategies.
Secure user management
Production-ready authentication systems with JWT tokens, refresh flows, role-based access control, and audit logging.
Live data & dashboards
Real-time monitoring dashboards for production systems, machine status, and performance metrics with live WebSocket feeds.
Schema design & optimisation
Database architecture, schema design, query optimisation, and migration strategies for relational and document stores.
Multi-tenant sales analytics platform
Multi-tenant SaaS for recording sold products and analysing business sales data, built with ASP.NET Core 8 Clean Architecture + CQRS and Angular 18.
Full GenericCoreLib coverage in one domain
An ASP.NET Core 8 Web API exercising all 15 MyCompany.Core modules: DDD aggregates, JWT auth, Redis caching, SQL Server, file uploads, domain events, pagination, and standardised HTTP responses.
Intentionally vulnerable practice environment
Three self-contained, intentionally vulnerable web applications for practising OWASP Top 10 attack techniques — PHP, Node.js (Express), and ASP.NET Core variants covering injection, broken auth, XSS, IDOR, and more.
Getting Started with Git and GitHub
Introduction to Web Development with HTML, CSS, JavaScript
Introduction to Cloud Computing
Introduction to Artificial Intelligence (AI)
Foundations of Cybersecurity
Insider Pro Orientation
Career Crash Course: Network Engineering
CompTIA Network+ (N10-007)
Introduction to IT & Cybersecurity
Welcome to the Cyber Security Engineer Career Path
Welcome to the Network Engineer Career Path
Malware Fundamentals
Malware Threats
How to Use Automater (BSWJ)
Kali Linux Fundamentals
NMAP
Phishing
Social Engineering
I'm always open to new opportunities, collaborations, or just a friendly chat about technology. Feel free to reach out!
Choose theme