infosec, Twitter, 1/16/2023 8:26:47 PM, 288219


FAQ | Problem?

infosec_2023-01-16_12-15-01.xlsx
infosec_2023-01-16_12-15-01.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
January 16, 2023
Short Description:
infosec via NodeXL https://bit.ly/3XxKXPl
@sectest9
@cybersecurityn8
@hackinarticles
@shubham_pen
@0dayctf
@securitytrybe
@ptracesecurity
@0xor0ne
@davidbombal
@beefyspace

Top hashtags:
#infosec
#cybersecurity
#pentesting
#hacking
#oscp
#informationsecurity

Description:
Description
The graph represents a network of 2,527 Twitter users whose recent tweets contained "infosec", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 1/15/2023 5:00:35 PM. The network was obtained from Twitter on Monday, 16 January 2023 at 20:22 UTC.

The tweets in the network were tweeted over the 2622-day, 14-hour, 13-minute period from Wednesday, 11 November 2015 at 10:46 UTC to Monday, 16 January 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 2527
Unique Edges : 1237
Edges With Duplicates : 9600
Total Edges : 10837
Number of Edge Types : 9
Retweet : 3376
MentionsInRetweet : 3775
Mentions : 650
Tweet : 1439
MentionsInReplyTo : 1317
Replies to : 181
MentionsInQuoteReply : 42
MentionsInQuote : 34
Quote : 23
Self-Loops : 1706
Reciprocated Vertex Pair Ratio : 0.0215350635008283
Reciprocated Edge Ratio : 0.0421621621621622
Connected Components : 274
Single-Vertex Connected Components : 144
Maximum Vertices in a Connected Component : 1927
Maximum Edges in a Connected Component : 8906
Maximum Geodesic Distance (Diameter) : 11
Average Geodesic Distance : 4.061946
Graph Density : 0.000579646390635922
Modularity : 0.299675
NodeXL Version : 1.0.1.508
Data Import : The graph represents a network of 2,527 Twitter users whose recent tweets contained "infosec", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 1/15/2023 5:00:35 PM. The network was obtained from Twitter on Monday, 16 January 2023 at 20:22 UTC.

The tweets in the network were tweeted over the 2622-day, 14-hour, 13-minute period from Wednesday, 11 November 2015 at 10:46 UTC to Monday, 16 January 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : TwitterSearch2
Graph Term : infosec
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[345] http://cyberiqs.com/latestnews
[115] https://networkwalks.com/networkwalks-summary-cheatsheets/
[65] https://xsshunter.com/
[65] http://xss.ht
[56] https://atomspam.com/
[53] https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development?s=09
[44] https://orange-cyberdefense.github.io/ocd-mindmaps/img/pentest_ad_dark_2022_11.svg
[44] https://adam-toscher.medium.com/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa
[44] https://ultimatewindowssecurity.com/securitylog/quickref/Default.aspx
[43] https://hakin9.org/wef-wifi-exploitation-framework/

Top URLs in Tweet in G1:
[345] http://cyberiqs.com/latestnews
[56] https://atomspam.com/
[14] https://phishstats.info/
[10] https://infosec-jobs.com/job/22116-it-security-engineer/
[8] https://www.csoonline.com/article/3675542/8-strange-ways-employees-can-accidently-expose-data.html
[7] https://go.dhs.gov/Z3Q
[7] https://www.scoop.it/topic/cybersecurity-leadership/p/4139925007/2023/01/15/cios-find-it-most-difficult-to-solve-cybersecurity-challenges?utm_medium=social&utm_source=twitter
[6] https://pentestmag.com/download/preview-wireless-pentesting-toolkit/
[6] https://www.scoop.it/topic/cybersecurity-leadership/p/4139924339/2023/01/15/cyber-insurance-a-must-have-not-a-nice-to-have?utm_medium=social&utm_source=twitter
[6] https://www.cpomagazine.com/data-protection/making-data-proactive-to-manage-risk/?utm_source=twitter&utm_medium=social&utm_campaign=novashare

Top URLs in Tweet in G2:
[9] https://securityzines.com/
[2] https://forms.gle/p5gYANJNDNbxBiE27
[2] https://twitter.com/hackinarticles/status/1614154516680822784/photo/1
[2] https://twitter.com/hackinarticles/status/1614509683947229184/photo/1
[1] https://twitter.com/hackinarticles/status/1614510073992339456/photo/1
[1] https://twitter.com/hackinarticles/status/1613992283090845696/photo/1
[1] https://twitter.com/hackinarticles/status/1613797375541407744/photo/1
[1] https://twitter.com/hackinarticles/status/1613917458200678402/photo/1
[1] https://twitter.com/hackinarticles/status/1611805712178630656/photo/1
[1] https://twitter.com/hackinarticles/status/1614510847203893249/photo/1

Top URLs in Tweet in G3:
[82] https://networkwalks.com/networkwalks-summary-cheatsheets/
[25] https://ultimatewindowssecurity.com/securitylog/quickref/Default.aspx
[10] https://community.fs.com/blog/tcpip-vs-osi-whats-the-difference-between-the-two-models.html
[3] https://helloitsliam.com/2015/06/03/web-app-penetration-testing-infographic/
[3] https://twitter.com/Shubham_pen/status/1614212101618147331/photo/1
[3] https://xmind.app/m/vQuTSG/#
[3] https://i.pinimg.com/originals/4e/02/1d/4e021dffb587cf7e72101df6859888ad.jpg
[3] https://securityzines.com/
[3] https://hacklido.com/blog/158
[2] https://kubernetes.io/docs/reference/kubectl/cheatsheet/

Top URLs in Tweet in G4:
[7] https://www.helpnetsecurity.com/2023/01/15/week-in-review-chatgpt-as-an-infosec-assistant-google-offers-help-to-eu-cybersecurity-startups/
[6] https://twinybots.ch/
[6] https://www.helpnetsecurity.com/2022/10/04/mandatory-password-expiration-helping-or-hurting-password-security/
[4] https://twitter.com/JustChillieh/status/1614559182333542401/photo/1
[4] https://twitter.com/win3zz/status/1613467576327094275/photo/1
[3] https://infosec.exchange/@SecureOwl/109689666314013084
[3] https://www.helpnetsecurity.com/2023/01/15/week-in-review-chatgpt-as-an-infosec-assistant-google-offers-help-to-eu-cybersecurity-startups/?utm_source=dlvr.it&utm_medium=twitter
[2] https://infosec.exchange/@jtk
[2] https://techcrunch.com/2023/01/13/sealed-buys-sensor-startup-infisense-to-fuel-energy-saving-services/
[2] https://infosec.exchange/@strandjs/109689389774456007

Top URLs in Tweet in G5:
[2] https://twitter.com/0dayCTF/status/1394427574152011777/photo/1
[2] https://orange-cyberdefense.github.io/ocd-mindmaps/img/pentest_ad_dark_2022_11.svg
[2] https://adam-toscher.medium.com/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa
[1] https://github.com/Th0h0/autossrf
[1] https://twitter.com/0dayCTF/status/1593996108207984642/photo/1
[1] https://pastebin.com/rKpsMp0g
[1] https://twitter.com/0dayCTF/status/1576942592868372480/photo/1
[1] https://github.com/lefayjey/linWinPwn
[1] https://twitter.com/0dayCTF/status/1614280560234401792/photo/1
[1] https://github.com/aas-n/spraykatz

Top URLs in Tweet in G6:
[33] https://hakin9.org/wef-wifi-exploitation-framework/
[13] https://github.com/efchatz/WPAxFuzz
[13] https://learn.microsoft.com/en-us/windows-server/identity/securing-privileged-access/reference-tools-logon-types
[9] https://michaelkoczwara.medium.com/sliver-c2-implant-analysis-62773928097f
[9] https://twitter.com/ptracesecurity/status/1614668920073371656/photo/1
[8] https://github.com/cisagov/ScubaGear
[8] https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development?s=09
[7] https://www.reversinglabs.com/blog/january-2023-updates-to-reversinglabs-threat-analysis-and-hunting-solution?utm_content=234101001&utm_medium=social&utm_source=twitter&hss_channel=tw-146486666
[7] https://ultimatewindowssecurity.com/securitylog/quickref/Default.aspx
[4] https://twitter.com/ptracesecurity/status/1614064821674151939/photo/1

Top URLs in Tweet in G7:
[54] https://xsshunter.com/
[54] http://xss.ht
[7] https://osv.dev
[3] https://sploitus.com
[3] https://twitter.com/0x0SojalSec/status/1612851177590509568/photo/1
[3] https://www.configure8.io/blog/log4j-why-organizations-are-failing-to-remediate-this-risk?utm_source=thenewstack&utm_medium=twitter&utm_campaign=platform
[3] https://networkwalks.com/networkwalks-summary-cheatsheets/
[2] https://adamjsturge.medium.com/easy-xsshunter-express-setup-script-d5a66039f7b6?sk=52394aa4a2d66779ffcaeaf7cab63af9
[2] https://www.reddit.com/r/blueteamsec/comments/zlf6ei/fbi_infragard_member_data_breached/?utm_source=dlvr.it&utm_medium=twitter
[2] https://www.reddit.com/r/blueteamsec/comments/zmazej/unusual_cache_poisoning_between_akamai_and_s3/?utm_source=dlvr.it&utm_medium=twitter

Top URLs in Tweet in G8:
[32] https://orange-cyberdefense.github.io/ocd-mindmaps/img/pentest_ad_dark_2022_11.svg
[32] https://adam-toscher.medium.com/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa
[17] https://blog.stazot.com/ssh-key-injection-google-cloud/
[12] https://github.com/daffainfo/AllAboutBugBounty
[4] https://www.reversinglabs.com/blog/january-2023-updates-to-reversinglabs-threat-analysis-and-hunting-solution?utm_content=234101001&utm_medium=social&utm_source=twitter&hss_channel=tw-146486666
[4] https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development?s=09
[3] https://medium.com/tenable-techblog/smb-access-is-denied-caused-by-anti-ntlm-relay-protection-659c60089895
[2] https://pentestmag.com/download/preview-wireless-pentesting-toolkit/
[2] https://securityzines.com/
[2] https://medium.com/m/global-identity-2?redirectUrl=https%3A%2F%2Finfosecwriteups.com%2Fpost-exploitation-basics-in-active-directory-enviorment-by-hashar-mujahid-d46880974f87

Top URLs in Tweet in G9:
[4] https://networkwalks.com/networkwalks-summary-cheatsheets/
[2] https://twitter.com/JimHarris/status/1610659639619915777/photo/1
[2] https://twitter.com/JimHarris/status/1604205820438355969/photo/1
[2] https://orange-cyberdefense.github.io/ocd-mindmaps/img/pentest_ad_dark_2022_11.svg
[2] https://adam-toscher.medium.com/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa
[2] https://labs.ksec.co.uk/product/sparrows-tuxedo-royale/
[1] https://www.youtube.com/watch?v=8MIIeIa25tE&feature=youtu.be

[1] https://twitter.com/davidbombal/status/1614639254776193026/photo/1
[1] https://twitter.com/JimHarris/status/1614641577325985792/photo/1
[1] https://twitter.com/CSCPROF/status/1611411863442493441/video/1

Top URLs in Tweet in G10:
[35] https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development?s=09
[7] https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x0-debugging.html
[4] https://twitter.com/0xor0ne/status/1614344143072903171/photo/1
[4] https://twitter.com/0xor0ne/status/1610908985888063488/photo/1
[4] https://twitter.com/0xor0ne/status/1608878124594339846/photo/1
[4] https://twitter.com/0xor0ne/status/1613083304135106560/photo/1
[4] https://twitter.com/0xor0ne/status/1614706498097090560/photo/1
[4] https://twitter.com/0xor0ne/status/1614178049066401793/photo/1
[4] https://twitter.com/0xor0ne/status/1613634478080987141/photo/1
[4] https://twitter.com/0xor0ne/status/1608372358259040256/photo/1

Top Domains
Top Domains in Tweet in Entire Graph:
[864] twitter.com
[345] cyberiqs.com
[120] github.com
[119] networkwalks.com
[113] paper.li
[92] medium.com
[65] xsshunter.com
[65] xss.ht
[62] github.io
[56] atomspam.com

Top Domains in Tweet in G1:
[345] cyberiqs.com
[296] twitter.com
[56] atomspam.com
[54] nationalcybersecurity.com
[27] github.com
[25] scoop.it
[19] infosec-jobs.com
[18] hacklido.com
[16] paper.li
[15] helpnetsecurity.com

Top Domains in Tweet in G2:
[31] twitter.com
[9] securityzines.com
[2] forms.gle
[1] ultimatewindowssecurity.com
[1] gitbook.io

Top Domains in Tweet in G3:
[84] networkwalks.com
[29] twitter.com
[25] ultimatewindowssecurity.com
[21] cyberfeed.io
[10] fs.com
[3] helloitsliam.com
[3] xmind.app
[3] pinimg.com
[3] securityzines.com
[3] hacklido.com

Top Domains in Tweet in G4:
[55] twitter.com
[25] infosec.exchange
[16] helpnetsecurity.com
[11] paper.li
[10] techcrunch.com
[6] twinybots.ch
[5] cybernoz.com
[4] github.com
[3] bleepingcomputer.com
[3] securityaffairs.com

Top Domains in Tweet in G5:
[9] twitter.com
[7] github.com
[2] github.io
[2] medium.com
[1] pastebin.com
[1] ultimatewindowssecurity.com
[1] networkwalks.com
[1] paper.li

Top Domains in Tweet in G6:
[78] twitter.com
[33] hakin9.org
[29] github.com
[17] medium.com
[13] microsoft.com
[11] kitploit.com
[11] pentesteracademy.com
[8] gitbook.io
[7] reversinglabs.com
[7] ultimatewindowssecurity.com

Top Domains in Tweet in G7:
[54] xsshunter.com
[54] xss.ht
[20] twitter.com
[11] reddit.com
[7] osv.dev
[4] medium.com
[3] sploitus.com
[3] configure8.io
[3] networkwalks.com
[2] start.me

Top Domains in Tweet in G8:
[38] medium.com
[32] github.io
[20] github.com
[17] stazot.com
[10] twitter.com
[4] reversinglabs.com
[4] gitbook.io
[3] securityzines.com
[3] paper.li
[2] pentestmag.com

Top Domains in Tweet in G9:
[9] twitter.com
[4] networkwalks.com
[3] co.uk
[2] github.io
[2] medium.com
[1] youtube.com
[1] securityzines.com
[1] github.com
[1] ultimatewindowssecurity.com
[1] hakin9.org

Top Domains in Tweet in G10:
[82] twitter.com
[35] gitbook.io
[14] github.io
[9] k3170makan.com
[5] cybergeeks.tech
[5] medium.com
[5] github.com
[4] blogspot.com
[3] nccgroup.com
[3] infosecwriteups.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3321] infosec
[2948] cybersecurity
[1065] pentesting
[868] hacking
[847] oscp
[704] informationsecurity
[693] ransomware
[648] cloudsecurity
[591] redteam
[580] malware



Top Hashtags in Tweet in G1:
[1710] infosec
[1648] cybersecurity
[666] ransomware
[639] cloudsecurity
[598] hacking
[538] malware
[496] cyberattack
[475] infosecurity
[419] threatintel
[418] privacy

Top Hashtags in Tweet in G2:
[260] cybersecuritytips
[247] infosec
[246] cybersecurity
[245] pentesting
[244] oscp
[236] redteam
[194] informationsecurity
[181] cissp
[11] cybersec
[11] networking

Top Hashtags in Tweet in G3:
[235] infosec
[225] cybersecurity
[197] pentesting
[173] oscp
[120] informationsecurity
[60] hacking
[60] redteam
[55] cissp
[29] cybersec
[21] technology

Top Hashtags in Tweet in G4:
[138] infosec
[78] cybersecurity
[22] technology
[21] security
[20] cybersec
[18] pentesting
[18] informationsecurity
[17] linux
[16] 100daysofcode
[14] hacking

Top Hashtags in Tweet in G5:
[19] infosec
[17] cybersecurity
[12] cybersecuritytips
[10] pentesting
[9] oscp
[8] ctf
[8] redteam
[8] informationsecurity
[7] bugbountytips
[6] cissp

Top Hashtags in Tweet in G6:
[183] infosec
[153] cybersecurity
[123] pentesting
[44] exploit
[44] redteam
[31] pentest
[26] oscp
[24] informationsecurity
[23] hacking
[17] cybersecuritytips

Top Hashtags in Tweet in G7:
[63] infosec
[32] bugbountytip
[30] cybersecurity
[17] pentesting
[12] oscp
[10] bugbountytips
[10] cyber
[9] cybersecuritytips
[8] threathunting
[7] redteam

Top Hashtags in Tweet in G8:
[60] infosec
[37] cybersecurity
[29] pentesting
[16] oscp
[16] bugbounty
[14] redteam
[12] informationsecurity
[12] cybersecuritytips
[10] bugbountytips
[9] hacking

Top Hashtags in Tweet in G9:
[43] cybersecurity
[40] infosec
[20] pentesting
[19] informationsecurity
[17] oscp
[14] redteam
[13] security
[12] cissp
[9] hacking
[9] cybersecuritytips

Top Hashtags in Tweet in G10:
[94] infosec
[52] exploit
[44] linux
[43] kernel
[39] cybersecurity
[21] pentesting
[13] oscp
[10] redteam
[10] informationsecurity
[8] cybersecuritytips

Top Words
Top Words in Tweet in Entire Graph:
[3320] #infosec
[2950] #cybersecurity
[1065] #pentesting
[868] #hacking
[847] #oscp
[704] #informationsecurity
[693] #ransomware
[648] #cloudsecurity
[591] #redteam
[580] #malware

Top Words in Tweet in G1:
[1710] #infosec
[1650] #cybersecurity
[666] #ransomware
[639] #cloudsecurity
[598] #hacking
[538] #malware
[496] #cyberattack
[475] #infosecurity
[424] #cyber
[421] #threatintel

Top Words in Tweet in G2:
[260] #cybersecuritytips
[247] #infosec
[246] #cybersecurity
[245] #pentesting
[244] #oscp
[236] #redteam
[222] hackinarticles
[194] #informationsecurity
[181] #cissp
[157] day

Top Words in Tweet in G3:
[235] #infosec
[225] #cybersecurity
[197] #pentesting
[173] #oscp
[164] shubham_pen
[137] credit
[120] #informationsecurity
[99] best
[85] cheat
[85] sheet

Top Words in Tweet in G4:
[137] #infosec
[78] #cybersecurity
[56] infosec
[33] security
[24] cybersecurity
[22] #technology
[21] #security
[20] #cybersec
[19] exchange
[19] week

Top Words in Tweet in G5:
[132] 0dayctf
[129] directory
[129] active
[126] crackmapexec
[126] vulnerability
[126] ldapdomaindump
[126] scan
[126] bloodhound
[126] scanner
[126] linwinpwn

Top Words in Tweet in G6:
[183] #infosec
[153] #cybersecurity
[123] #pentesting
[97] ptracesecurity
[45] exploitation
[44] #redteam
[44] #exploit
[38] security
[37] wifi
[35] cyberwarship

Top Words in Tweet in G7:
[63] #infosec
[62] taksec
[59] xss
[55] server
[54] hunter
[54] feb
[54] down
[54] build
[54] starting
[54] 1st

Top Words in Tweet in G8:
[60] #infosec
[53] active
[53] directory
[44] works
[44] dns
[41] vulnerability
[37] #cybersecurity
[35] access
[34] attacks
[34] resources

Top Words in Tweet in G9:
[85] next
[85] bank
[85] billionaire
[85] video
[85] yourself
[85] youtube
[85] protect
[85] hacked
[84] davidbombal
[43] #cybersecurity

Top Words in Tweet in G10:
[98] 0xor0ne
[94] #infosec
[87] linux
[83] kernel
[59] series
[56] exploitation
[52] #exploit
[45] intro
[44] #linux
[43] #kernel

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[1157] #infosec,#cybersecurity
[844] #pentesting,#oscp
[528] #cybersecurity,#cybersecuritytips
[527] #cybersecuritytips,#pentesting
[485] #cybersecurity,#infosec
[476] #malware,#ransomware
[441] #infosec,#infosecurity
[437] #oscp,#redteam
[431] #infosecurity,#cybersecurity
[420] #cybersecurity,#threatintel

Top Word Pairs in Tweet in G1:
[468] #malware,#ransomware
[437] #infosec,#infosecurity
[428] #infosecurity,#cybersecurity
[418] #cybersecurity,#threatintel
[409] #infosec,#cybersecurity
[385] #threatintel,#threatintelligence
[372] #threatintelligence,#hacking
[359] #hacking,#cybernews
[351] #cyber,#threathunting
[351] #cybernews,#cyberattack

Top Word Pairs in Tweet in G2:
[246] #infosec,#cybersecurity
[244] #pentesting,#oscp
[244] #cybersecurity,#cybersecuritytips
[244] #cybersecuritytips,#pentesting
[236] #oscp,#redteam
[194] #redteam,#informationsecurity
[181] #informationsecurity,#cissp
[157] day,#infosec
[157] pic,day
[144] #cissp,#c

Top Word Pairs in Tweet in G3:
[219] #infosec,#cybersecurity
[180] #cybersecurity,#pentesting
[173] #pentesting,#oscp
[137] credit,#infosec
[108] #oscp,#informationsecurity
[93] shubham_pen,best
[85] cheat,sheet
[76] sheet,credit
[59] best,tcp
[59] #informationsecurity,#hacking

Top Word Pairs in Tweet in G4:
[23] #infosec,#cybersecurity
[19] #cybersecurity,#infosec
[18] infosec,exchange
[15] offers,help
[15] week,review
[15] infosec,assistant
[15] eu,cybersecurity
[15] help,eu
[14] review,chatgpt
[14] cybersecurity,startups

Top Word Pairs in Tweet in G5:
[129] active,directory
[126] crackmapexec,ldapdomaindump
[126] linwinpwn,active
[126] help,impacket
[126] scan,help
[126] bloodhound,crackmapexec
[126] directory,vulnerability
[126] scanner,scan
[126] vulnerability,scanner
[126] impacket,bloodhound

Top Word Pairs in Tweet in G6:
[86] #cybersecurity,#infosec
[34] #infosec,#cybersecurity
[33] wef,wifi
[33] framework,#pentesting
[33] wifi,exploitation
[33] exploitation,framework
[33] #exploit,#cybersecurity
[33] #pentesting,#exploit
[32] ptracesecurity,wef
[26] #pentesting,#oscp

Top Word Pairs in Tweet in G7:
[54] down,starting
[54] hunter,server
[54] going,down
[54] starting,feb
[54] build,xss
[54] xss,hunter
[54] 1st,build
[54] feb,1st
[53] taksec,going
[53] server,ea

Top Word Pairs in Tweet in G8:
[53] active,directory
[44] dns,works
[32] initial,access
[32] resources,roadmap
[32] mitm6,attacks
[32] directory,resources
[32] roadmap,initial
[32] access,mitm6
[31] nullshock1,active
[23] #infosec,#cybersecurity

Top Word Pairs in Tweet in G9:
[85] next,protect
[85] yourself,youtube
[85] bank,next
[85] protect,yourself
[85] hacked,billionaire
[85] youtube,video
[85] billionaire,bank
[84] davidbombal,hacked
[20] #infosec,#cybersecurity
[17] #pentesting,#oscp

Top Word Pairs in Tweet in G10:
[82] linux,kernel
[44] kernel,exploitation
[43] intro,series
[42] #linux,#kernel
[42] #exploit,#infosec
[38] #kernel,#exploit
[37] years,old
[37] couple,years
[37] old,still
[35] fuzzing,credits

Top Replied-To
Top Mentioned
Top Mentioned in Entire Graph:
@hackinarticles
@shubham_pen
@0dayctf
@ptracesecurity
@securitytrybe
@0xor0ne
@tech
@davidbombal
@cyberiqs_
@taksec

Top Mentioned in G1:
@tech
@cyberiqs_
@hackinarticles
@atomspam
@shubham_pen
@hackwithnichola
@damain_cyber
@jinibabd
@classiqagogo2
@great_louis1

Top Mentioned in G2:
@hackinarticles
@cm_alliance
@securitytube
@shubham_pen
@0xor0ne
@three_cube
@cyberwarship
@viehgroup

Top Mentioned in G3:
@shubham_pen
@hackinarticles
@infoseccomm
@hacklido
@wiebetech
@alexisbrignoni
@aacle_
@rdpsnitch
@securitytrybe
@thehackersnews

Top Mentioned in G4:
@infosec_coder
@strandjs
@cdwgwagov
@jtkristoff
@desagehack

Top Mentioned in G5:
@0dayctf
@hackinarticles
@t3l3machus
@shubham_pen
@nullshock1
@th0h0
@aas_s3curity
@d3ext
@muirlandoracle
@ptracesecurity

Top Mentioned in G6:
@ptracesecurity
@cyberwarship
@hackinarticles
@shubham_pen
@securitytube
@0xor0ne
@securitytrybe
@cioamaro
@cybermat3rial
@windows

Top Mentioned in G7:
@taksec
@marcos_iaf
@0x0sojalsec
@0dayctf
@hetmehtaa
@blueteamsec1
@shubham_pen
@0reosec
@ptracesecurity
@hackinarticles

Top Mentioned in G8:
@nullshock1
@0x1shu
@7h3h4ckv157
@payloadartist
@sivaneshashok
@kl_sree
@ptracesecurity
@hackinarticles
@akita_zen
@shubham_pen

Top Mentioned in G9:
@davidbombal
@shubham_pen
@hackinarticles
@jimharris
@cscprof
@securitytrybe
@0dayctf
@kingcoolvikas
@ptracesecurity
@nullshock1

Top Mentioned in G10:
@0xor0ne
@nccgroupinfosec
@nikahverse
@hackinarticles
@ptracesecurity
@shubham_pen
@0dayctf
@geekscyber
@theflow0

Top Tweeters
Top Tweeters in Entire Graph:
@sectest9
@chidambara09
@jurylady5
@cybersecurityn8
@javascriptd
@bannerite
@evankirstel
@thehill
@rahul05ranjan
@dataaugmented

Top Tweeters in G1:
@sectest9
@chidambara09
@cybersecurityn8
@thehill
@rahul05ranjan
@dataaugmented
@periscopeislit
@ucloudify
@andrewmorrisuk
@sabcnews

Top Tweeters in G2:
@3vil_qu33n
@xy_krasnodon
@adam_it_
@alfreddelarosa
@smhjan
@k_athanasi
@infogon
@landisharthur_
@worawutg
@waffirian_

Top Tweeters in G3:
@abubakarmundir
@enricofrasca3
@1sandy_n_austin
@ideaspbusiness
@apostolwario
@hibicimidimi
@fyrumunna
@impofigu
@howtopam
@abdullahalzakry

Top Tweeters in G4:
@alizardx
@youranonriots
@joviannfeed
@sec_cyber
@cyberguardnews
@halfeatenmind
@ton_aarts
@smesecurity
@poseidontpa
@cdwgwagov

Top Tweeters in G5:
@niranam_salt
@thedevilops
@essobi
@good_sector
@sskras
@chibuezeogah
@piz69
@jkopacko
@brightzeed
@shipcod3

Top Tweeters in G6:
@ayirpelle
@windows
@dariosailor86
@jewhaditm
@securitytube
@alternative200
@aldana_angel
@georgemappjr
@barbizon_streak
@reveldes_vdv

Top Tweeters in G7:
@_blackmac
@offethhacker
@thenewstack
@dinosn
@sendyournft
@antiartificial
@mfatah281
@sumgr0
@sigi2543
@scalefree

Top Tweeters in G8:
@thagedhele
@michael_warren
@mythicalcmd
@m3g9tr0n
@shawnetuma
@fprado28
@puneethrebel9
@erumichael_
@smartideas01
@secure_overflow

Top Tweeters in G9:
@justafandavid
@justthisguy
@mgg_2012
@akawombat42
@acarr642
@0xblock0
@dah1122_
@patrick2feather
@andres_riscv
@jimharris

Top Tweeters in G10:
@savetonotion
@rejectionking
@0x4d_
@pc65049955
@ali19baba
@nono2357
@m_albunni1
@proxyqtr5
@gawojtek
@niktinroya