infosec, Twitter, 8/15/2022 8:42:50 PM, 280143


FAQ | Problem?

infosec_2022-08-15_12-15-01.xlsx
infosec_2022-08-15_12-15-01.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
August 15, 2022
Short Description:
infosec via NodeXL https://bit.ly/3pmWvWE
@hackinarticles
@alyssam_infosec
@sectest9
@cybersecurityn8
@shubham_pen
@cyberdfir
@three_cube
@hakin9
@defcon
@beefyspace

Top hashtags:
#infosec
#cybersecurity
#pentesting
#oscp
#redteam
#informationsecurity

Description:
Description
The graph represents a network of 3,878 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Monday, 15 August 2022 at 19:27 UTC.

The requested start date was Monday, 15 August 2022 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 2-day, 0-hour, 44-minute period from Friday, 12 August 2022 at 20:20 UTC to Sunday, 14 August 2022 at 21:05 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3878
Unique Edges : 2691
Edges With Duplicates : 14615
Total Edges : 17306
Number of Edge Types : 5
Mentions : 2998
Replies to : 589
Retweet : 5555
MentionsInRetweet : 6558
Tweet : 1606
Self-Loops : 1747
Reciprocated Vertex Pair Ratio : 0.0327102803738318
Reciprocated Edge Ratio : 0.0633484162895928
Connected Components : 389
Single-Vertex Connected Components : 189
Maximum Vertices in a Connected Component : 3121
Maximum Edges in a Connected Component : 16342
Maximum Geodesic Distance (Diameter) : 12
Average Geodesic Distance : 4.360177
Graph Density : 0.000440970891531403
Modularity : 0.322778
NodeXL Version : 1.0.1.503
Data Import : The graph represents a network of 3,878 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Monday, 15 August 2022 at 19:27 UTC.

The requested start date was Monday, 15 August 2022 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 2-day, 0-hour, 44-minute period from Friday, 12 August 2022 at 20:20 UTC to Sunday, 14 August 2022 at 21:05 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : GraphServerTwitterSearch
Graph Term : infosec
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[116] https://www.git-tower.com/blog/command-line-cheat-sheet/
[82] https://foxutech.com/what-is-dns-and-how-it-works/
[79] https://hakin9.org/hetty-an-http-toolkit-for-security-research/
[68] https://phoenixnap.com/kb/vim-commands-cheat-sheet
[59] https://helloitsliam.com/2015/06/03/web-app-penetration-testing-infographic/
[57] https://twinybots.ch/
[55] https://phishstats.info/
[52] https://hakin9.org/winshark-wireshark-plugin-to-work-with-event-tracing-for-windows/
[51] http://cyberiqs.com/latestnews
[47] https://www.cyberick.com/post/bypass-captcha-using-turbo-intruder-leads-to-bruteforce-attack-bug-bounty

Top URLs in Tweet in G1:
[51] http://cyberiqs.com/latestnews
[47] https://twinybots.ch/
[42] https://phishstats.info/
[16] https://www.git-tower.com/blog/command-line-cheat-sheet/
[15] https://phoenixnap.com/kb/vim-commands-cheat-sheet
[14] https://biggerplate.com/mindmaps/Tdgyko0d/mobile-hacking-glossary
[14] https://opsec.market/
[14] https://whova.com/web/S01MAxzRa49H60XWA6U3vkikTxPUTwLpY4t6Ro00Hx0%3D/
[12] https://hakin9.org/hetty-an-http-toolkit-for-security-research/
[11] https://www.scmagazine.com/resource/cybersecurity-asset-management/mitre-engenuity-attck-what-endpoint-security-vendors-learned-after-evals

Top URLs in Tweet in G2:
[83] https://www.git-tower.com/blog/command-line-cheat-sheet/
[58] https://foxutech.com/what-is-dns-and-how-it-works/
[56] https://hakin9.org/hetty-an-http-toolkit-for-security-research/
[42] https://helloitsliam.com/2015/06/03/web-app-penetration-testing-infographic/
[42] https://phoenixnap.com/kb/vim-commands-cheat-sheet
[34] https://hakin9.org/winshark-wireshark-plugin-to-work-with-event-tracing-for-windows/
[34] https://www.cyberick.com/post/bypass-captcha-using-turbo-intruder-leads-to-bruteforce-attack-bug-bounty
[26] https://www.blueteamsacademy.com/elk/
[26] https://www.blueteamsacademy.com/incident-response-and-security-operations-fundamentals/
[24] https://hakin9.org/hackbrowserdata-decrypt-passwords-cookies-history-bookmarks-from-the-browser/

Top URLs in Tweet in G3:
[3] https://tweetedtimes.com/v/16326
[2] https://twitter.com/alyssam_infosec/status/1557944459773390853
[2] https://youtu.be/IEFNSf0Jx4M
[2] https://hakin9.org/hetty-an-http-toolkit-for-security-research/
[2] https://foxutech.com/what-is-dns-and-how-it-works/
[2] https://hakin9.org/scrummage-tool-that-centralises-search-functionality-from-powerful-yet-simple-osint-sites/
[1] https://twitter.com/i/web/status/1558582200383070208
[1] https://twitter.com/i/web/status/1558582609373933568
[1] https://twitter.com/SiliconShecky/status/1558292401416028166
[1] https://twitter.com/AlmaRinasz/status/1558796658661593088

Top URLs in Tweet in G4:
[12] https://foxutech.com/what-is-dns-and-how-it-works/
[11] https://www.git-tower.com/blog/command-line-cheat-sheet/
[5] https://helloitsliam.com/2015/06/03/web-app-penetration-testing-infographic/
[5] https://phoenixnap.com/kb/vim-commands-cheat-sheet
[4] https://github.com/Cyber-Guy1/API-SecurityEmpire
[4] https://www.edureka.co/blog/blockchain-through-the-years/
[3] https://hakin9.org/docker-osx-run-mac-in-a-docker-container/
[3] https://hakin9.org/winshark-wireshark-plugin-to-work-with-event-tracing-for-windows/
[3] https://www.bleepingcomputer.com/news/security/anonymous-poop-gifting-site-hacked-customers-exposed/
[2] https://hakin9.org/hackbrowserdata-decrypt-passwords-cookies-history-bookmarks-from-the-browser/

Top URLs in Tweet in G5:
[22] https://uniquesservice.com/product/buy-verified-paypal-accounts/
[10] https://www.dr-farfar.com/pinflux-agency/
[9] https://www.dr-farfar.com/auto-telegram-business-edition/
[8] https://seosmmshop.com/product/buy-verified-paypal-accounts/
[7] https://techcrunch.com/2022/08/13/youre-not-that-special-i-swear-theres-a-startup-angle-here/
[6] https://www.dr-farfar.com/trending/
[6] https://usasmmmarket.com/product/buy-google-voice-account/
[6] https://usasmmmarket.com/product/buy-old-gmail-accounts/
[5] https://www.hackthebox.com/achievement/machine/48308/482
[5] https://coder1life.blogspot.com/2022/08/python-cipher-program-using-numpy.html

Top URLs in Tweet in G6:
[5] https://www.youtube.com/watch?v=3yiT_WMlosg&feature=youtu.be

[5] https://foxutech.com/what-is-dns-and-how-it-works/
[4] https://phoenixnap.com/kb/vim-commands-cheat-sheet
[4] https://helloitsliam.com/2015/06/03/web-app-penetration-testing-infographic/
[3] https://www.hackers-arise.com/post/2016/05/23/getting-started-with-kali-linux
[3] https://www.git-tower.com/blog/command-line-cheat-sheet/
[2] https://www.hackers-arise.com/online-store/Cybersecurity-Hacker-Starter-Bundle-p378227691
[2] https://www.hackers-arise.com/post/network-basics-for-hackers-part-3-subnetting-network-masks-and-cidr-basics
[2] https://www.hackers-arise.com/post/2017/01/25/metasploit-part-1-getting-started-with-metasploit
[2] https://hakin9.org/codext-encode-decode-anything-with-python/

Top URLs in Tweet in G7:
[5] https://thehackernews.com/2022/08/chinese-hackers-backdoored-mimi-chat.html
[2] https://twinybots.ch/
[2] https://www.wired.com/story/va-vista-medical-records-flaw/
[2] https://www.wired.com/story/ftc-privacy-crackdown-security-roundup/
[2] https://forms.gle/MiKgPZAwW77GJCjP6
[2] https://safe.s.id/r?url=https://info.nakanosec.com/
[2] https://twitter.com/kwiens/status/1558688970799648769
[2] https://www.udemy.com/course/infosec-fundamentals/?couponCode=83BFCCC5D0FF2793BC7D
[2] https://khalil-shreateh.com/khalil.shtml/it-highlights/latest-vulnerabilities-and-exploits/39668-Fiberhome-AN5506-02-B-Cross-Site-Scripting.html
[2] https://open-sez.me/

Top URLs in Tweet in G8:
[25] https://sagarsajeev.medium.com/file-upload-bypass-to-rce-76991b47ad8f
[11] https://link.medium.com/srVRc29prsb
[7] https://www.trendmicro.com/en_us/security-intelligence/breaking-news/cyber-risk-index.html?utm_campaign=GBEV2021_Corporate_Black_Hat&utm_medium=Influencer&utm_source=Twitter_Paid&utm_content=TechMode-CRI
[7] https://johannesdrooghaag.com/the-human-element-in-cyber-security
[7] https://link.medium.com/AsMgjdiqrsb
[3] https://rbebooks.site/python-tricks-the-book-a-buffet-of-awesome-python-features/
[3] https://github.com/Mr-Robert0/Logsensor
[3] https://www.cyberick.com/post/bypass-captcha-using-turbo-intruder-leads-to-bruteforce-attack-bug-bounty
[2] https://rbebooks.site/reactive-programming-with-kotlin/
[2] https://rbebooks.site/real-world-bug-hunting-a-field-guide-to-web-hacking/

Top URLs in Tweet in G9:
[1] https://twitter.com/nbcswhitesox/status/1558909575742586882
[1] https://twitter.com/DannyVietti/status/1558262327501197312?s=20&t=inhMCeE6HQj89XPunbBucQ
[1] https://app.jobvite.com/m?3uzRvmwg
[1] https://twitter.com/madelinehorwat1/status/1558503019821555712
[1] https://twitter.com/i/web/status/1558599373960929285
[1] https://twitter.com/fredschultz35/status/1558441814339866626

Top URLs in Tweet in G10:
[4] https://threatpost.com/messaging-apps-cybercriminals/180303/?utm_source=dlvr.it&utm_medium=twitter
[2] https://www.thebulwark.com/the-distinct-shame-of-senate-republicans/
[2] https://www.informationweek.com/security-and-risk-strategy/black-hat-at-25-why-cybersecurity-is-going-to-get-worse-before-it-gets-better
[2] https://purplesec.us/security-insights/maui-ransomware/
[2] https://eforensicsmag.com/a-short-tutorial-about-building-linux-based-operating-systems-by-michiel-derhaeg/
[2] https://www.axios.com/2022/08/13/trump-mar-a-lago-national-security-assessment?utm_medium=social&utm_campaign=editorial&utm_source=twitter
[2] https://www.cerias.purdue.edu/site/blog/post/on_competitions_and_competence/
[2] https://www.nextgov.com/cybersecurity/2022/08/white-house-cyber-director-defense-new-offense-cyber/375822/?utm_content=buffer7850a&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[2] https://trib.al/A4U62Ce
[2] https://paper.li/RialtoBoard/1474546020?share_id=318270d0-1b4c-11ed-8842-fa163e6ccaff

Top Domains
Top Domains in Tweet in Entire Graph:
[511] twitter.com
[444] hakin9.org
[163] github.com
[131] medium.com
[117] git-tower.com
[106] dr-farfar.com
[87] youtube.com
[82] foxutech.com
[74] thehackernews.com
[68] phoenixnap.com

Top Domains in Tweet in G1:
[184] twitter.com
[84] hakin9.org
[51] cyberiqs.com
[50] darkreading.com
[49] github.com
[47] twinybots.ch
[43] youtube.com
[42] phishstats.info
[37] dr-farfar.com
[37] thehackernews.com

Top Domains in Tweet in G2:
[274] hakin9.org
[83] git-tower.com
[75] github.com
[58] foxutech.com
[52] blueteamsacademy.com
[42] helloitsliam.com
[42] phoenixnap.com
[40] reddit.com
[34] cyberick.com
[29] twitter.com

Top Domains in Tweet in G3:
[39] twitter.com
[7] hakin9.org
[6] helpnetsecurity.com
[4] github.com
[3] itspmagazine.com
[3] tweetedtimes.com
[2] youtu.be
[2] infosec.tirol
[2] theregister.com
[2] securitybrief.asia

Top Domains in Tweet in G4:
[13] hakin9.org
[12] foxutech.com
[11] git-tower.com
[8] twitter.com
[6] github.com
[5] helloitsliam.com
[5] phoenixnap.com
[4] edureka.co
[4] wordpress.com
[3] bleepingcomputer.com

Top Domains in Tweet in G5:
[66] dr-farfar.com
[38] twitter.com
[30] hakin9.org
[27] usasmmmarket.com
[22] uniquesservice.com
[17] techcrunch.com
[9] hackthebox.com
[8] seosmmshop.com
[7] youtube.com
[5] blogspot.com

Top Domains in Tweet in G6:
[23] hackers-arise.com
[15] hakin9.org
[8] twitter.com
[6] youtube.com
[5] foxutech.com
[4] phoenixnap.com
[4] helloitsliam.com
[3] github.com
[3] git-tower.com
[2] goarmysof.com

Top Domains in Tweet in G7:
[96] twitter.com
[9] thehackernews.com
[8] blogspot.com
[8] medium.com
[8] s.id
[6] paper.li
[5] github.com
[5] aptrack.co
[5] wired.com
[5] programmatic.solutions

Top Domains in Tweet in G8:
[46] medium.com
[12] github.com
[8] rbebooks.site
[7] trendmicro.com
[7] johannesdrooghaag.com
[3] twitter.com
[3] cyberick.com
[2] theregister.com
[2] dr-farfar.com
[2] spyonweb.com

Top Domains in Tweet in G9:
[5] twitter.com
[1] jobvite.com

Top Domains in Tweet in G10:
[8] twitter.com
[4] threatpost.com
[3] purplesec.us
[3] axios.com
[2] thebulwark.com
[2] informationweek.com
[2] eforensicsmag.com
[2] purdue.edu
[2] nextgov.com
[2] trib.al

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[5045] infosec
[4037] cybersecurity
[1766] pentesting
[1374] oscp
[1069] redteam
[884] informationsecurity
[784] cybersecuritytips
[675] hacking
[541] security
[423] infosecurity



Top Hashtags in Tweet in G1:
[1967] infosec
[1844] cybersecurity
[391] security
[373] infosecurity
[361] pentesting
[333] hacking
[315] informationsecurity
[294] cybersec
[292] threatintel
[281] oscp

Top Hashtags in Tweet in G2:
[1084] infosec
[875] cybersecurity
[724] pentesting
[498] oscp
[337] redteam
[265] pentest
[176] informationsecurity
[138] hacking
[76] cybersecuritytips
[73] bugbountytips

Top Hashtags in Tweet in G3:
[100] infosec
[65] cybersecurity
[23] defcon30
[20] pentesting
[15] defcon
[14] infosecurity
[13] redteam
[13] oscp
[11] news
[11] bugbountytips

Top Hashtags in Tweet in G4:
[537] infosec
[519] cybersecurity
[479] pentesting
[469] oscp
[427] cybersecuritytips
[427] redteam
[287] informationsecurity
[74] cissp
[32] cybersec
[21] security

Top Hashtags in Tweet in G5:
[346] infosec
[292] programming
[209] javascript
[195] 100daysofcode
[186] cybersecurity
[164] linux
[144] reactjs
[142] dev
[141] python
[138] codenewbie

Top Hashtags in Tweet in G6:
[345] infosec
[157] cybersecurity
[90] metasploit
[90] metasploit4hackers
[70] pentesting
[62] networkbasics
[59] oscp
[55] redteam
[52] networks
[52] subnetting

Top Hashtags in Tweet in G7:
[155] infosec
[73] cybersecurity
[25] security
[20] hacking
[19] pentesting
[14] informationsecurity
[13] cybersec
[13] bugbounty
[11] computer
[10] oscp

Top Hashtags in Tweet in G8:
[97] infosec
[63] bugbounty
[62] bugbountytips
[45] cybersecurity
[29] hacking
[28] cybersecuritytips
[27] bugbountytip
[25] hackerone
[20] ethicalhacking
[15] linux

Top Hashtags in Tweet in G9:
[2] security
[1] infosecjobs
[1] infosec
[1] cybersecurity
[1] jobs
[1] riskmanagement
[1] rmf
[1] job
[1] pipelineproblem

Top Hashtags in Tweet in G10:
[10] cybersecurity
[10] infosec
[5] security
[2] climatechange
[2] environment
[2] cybercrime
[2] ai
[2] bcpoli
[2] bchealthcare
[2] bchospitaldata

Top Words
Top Words in Tweet in Entire Graph:
[5055] #infosec
[4044] #cybersecurity
[1766] #pentesting
[1374] #oscp
[1069] #redteam
[884] #informationsecurity
[861] security
[789] #cybersecuritytips
[769] cheat
[766] sheet

Top Words in Tweet in G1:
[1972] #infosec
[1849] #cybersecurity
[425] security
[391] #security
[373] #infosecurity
[361] #pentesting
[333] #hacking
[315] #informationsecurity
[306] #cybersec
[292] #threatintel

Top Words in Tweet in G2:
[1084] #infosec
[875] #cybersecurity
[724] #pentesting
[498] #oscp
[426] credit
[407] shubham_pen
[337] #redteam
[289] sheet
[288] cheat
[273] hakin9

Top Words in Tweet in G3:
[219] alyssam_infosec
[127] infosec
[100] #infosec
[77] defcon
[64] #cybersecurity
[52] many
[48] people
[35] friends
[33] please
[33] twitter

Top Words in Tweet in G4:
[539] #infosec
[521] #cybersecurity
[479] #pentesting
[469] #oscp
[429] #cybersecuritytips
[427] #redteam
[396] hackinarticles
[287] #informationsecurity
[255] cheat
[251] sheet

Top Words in Tweet in G5:
[346] #infosec
[292] #programming
[209] #javascript
[195] #100daysofcode
[186] #cybersecurity
[164] #linux
[163] programmerjoke9
[144] #reactjs
[142] #dev
[141] #python

Top Words in Tweet in G6:
[345] #infosec
[227] three_cube
[198] hackers
[187] basics
[180] metasploit
[157] #cybersecurity
[139] part
[127] getting
[127] started
[90] #metasploit

Top Words in Tweet in G7:
[155] #infosec
[73] #cybersecurity
[55] infosec
[54] security
[25] #security
[20] #hacking
[20] cyber
[19] #pentesting
[18] linux
[17] cybersecurity

Top Words in Tweet in G8:
[97] #infosec
[65] #bugbounty
[62] #bugbountytips
[45] #cybersecurity
[45] sarabadran18
[32] bypass
[31] security
[29] #hacking
[28] #cybersecuritytips
[27] #bugbountytip

Top Words in Tweet in G9:
[37] alyssam_infosec
[31] mat__savage
[31] blowdart
[30] muteki_rtw
[30] k3n_5s
[29] olmaverick
[29] quadling
[28] docwho76
[28] shatter242
[28] elkentaro

Top Words in Tweet in G10:
[24] trump
[10] #cybersecurity
[10] security
[10] #infosec
[9] years
[8] documents
[8] cyber
[6] over
[6] cybersecboardrm
[6] read

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[2056] #infosec,#cybersecurity
[1369] #pentesting,#oscp
[764] cheat,sheet
[748] #cybersecurity,#infosec
[739] #cybersecurity,#cybersecuritytips
[728] #cybersecuritytips,#pentesting
[654] #cybersecurity,#pentesting
[633] #oscp,#redteam
[495] credit,#infosec
[443] #redteam,#informationsecurity

Top Word Pairs in Tweet in G1:
[489] #infosec,#cybersecurity
[443] #cybersecurity,#infosec
[277] #pentesting,#oscp
[259] #infosec,#infosecurity
[251] #infosecurity,#cybersecurity
[250] #cybersecurity,#threatintel
[233] #threatintel,#threatintelligence
[168] cheat,sheet
[151] #cybersecurity,#cybersecuritytips
[146] #news,#cybersecurity

Top Word Pairs in Tweet in G2:
[774] #infosec,#cybersecurity
[498] #pentesting,#oscp
[432] #cybersecurity,#pentesting
[344] credit,#infosec
[287] cheat,sheet
[251] sheet,credit
[218] #cybersecurity,#redteam
[175] #redteam,#pentest
[146] #pentest,#pentesting
[122] #oscp,#informationsecurity

Top Word Pairs in Tweet in G3:
[27] infosec,twitter
[24] adversaryvillag,defcon
[22] infosec,infosec
[21] many,thoughts
[21] thoughts,please
[21] please,newer
[21] newer,friends
[21] friends,infosec
[21] twitter,infosec
[21] infosec,confused

Top Word Pairs in Tweet in G4:
[489] #infosec,#cybersecurity
[469] #pentesting,#oscp
[429] #cybersecurity,#cybersecuritytips
[427] #cybersecuritytips,#pentesting
[412] #oscp,#redteam
[277] #redteam,#informationsecurity
[251] cheat,sheet
[220] sheet,#infosec
[154] #informationsecurity,#
[110] server,responses

Top Word Pairs in Tweet in G5:
[142] #javascript,#programming
[142] #programming,#dev
[142] #dev,#linux
[136] #linux,#java
[134] #java,#programming
[132] #programming,#codenewbie
[100] #codenewbie,#python
[96] #python,#reactjs
[68] #datasecurity,#privacy
[61] discount,100

Top Word Pairs in Tweet in G6:
[187] basics,hackers
[140] #infosec,#cybersecurity
[127] getting,started
[123] part,getting
[110] hackers,part
[90] metasploit,basics
[90] started,metasploit
[90] metasploit,#metasploit
[90] #metasploit,#metasploit4hackers
[90] #metasploit4hackers,#infosec

Top Word Pairs in Tweet in G7:
[28] #cybersecurity,#infosec
[18] #infosec,#cybersecurity
[13] #infosec,#security
[13] cyber,security
[10] #infosec,#hacking
[10] #pentesting,#oscp
[9] cheat,sheet
[9] bug,bounty
[9] bounty,article
[9] article,tags

Top Word Pairs in Tweet in G8:
[27] #cybersecurity,#infosec
[26] #bugbounty,#bugbountytips
[25] file,upload
[25] upload,bypass
[25] bypass,rce
[25] rce,sagar__sajeev
[25] sagar__sajeev,#hackerone
[25] #hackerone,#bugbounty
[24] sarabadran18,file
[24] #bugbountytips,#h

Top Word Pairs in Tweet in G9:
[27] muteki_rtw,docwho76
[27] docwho76,k3n_5s
[26] abaranov,sogonsec
[26] sogonsec,justthisguy
[26] justthisguy,steved3
[26] knarphie,pukingmonkey
[26] pukingmonkey,kobeski1906
[26] mat__savage,aprilwright
[26] aprilwright,trashp4ndasec
[26] trashp4ndasec,blowdart

Top Word Pairs in Tweet in G10:
[6] mar,lago
[6] #cybersecurity,#infosec
[4] data,security
[4] trump,administration
[4] years,ago
[4] messaging,apps
[4] apps,tapped
[4] tapped,platform
[4] platform,cybercriminal
[4] cybercriminal,activity

Top Replied-To
Top Replied-To in Entire Graph:
@alyssam_infosec
@infosec_jcp
@jasonhikes1
@pdaudt_infosec
@quadling
@bpetty_infosec
@feederofcats
@elkentaro
@dougiethreelegs
@shortxstack

Top Replied-To in G1:
@tonyeditss
@s6vet_infosec
@royalhoeliness
@cothicakeywitch
@tartanllama
@stonekettle
@wejuli
@alyssam_infosec
@kaynemcgladrey
@vividconfusion

Top Replied-To in G2:
@shubham_pen
@clarkey2019
@aakkk191
@infosec_au
@tcmsecurity
@solo_ist
@d4rckh
@hackinarticles
@dinosn
@thebinarybot

Top Replied-To in G3:
@alyssam_infosec
@pdaudt_infosec
@sogonsec
@ush1c
@malanalysis
@cyberkrinn
@3dot14r8
@kimzetter
@arriishere
@elkentaro

Top Replied-To in G4:
@alyssam_infosec
@nevadadmv

Top Replied-To in G8:
@infosec_au
@alyssam_infosec
@kartikeyvinayak

Top Replied-To in G9:
@quadling
@alyssam_infosec
@shatter242
@elkentaro
@torettox84
@unixsadm
@dalanshark
@khaxan
@amunfox
@ajediday

Top Replied-To in G10:
@dinodaizovi
@hockeyinjune
@michalis_vlahos
@donlew87
@eygesjeffrey
@ramimayron

Top Mentioned
Top Mentioned in Entire Graph:
@hackinarticles
@shubham_pen
@hakin9
@three_cube
@paula_piccard
@programmerjoke9
@cyberiqs_
@ptracesecurity
@deepfriedcyber
@reach2ratan

Top Mentioned in G1:
@cyberiqs_
@paula_piccard
@hackinarticles
@shubham_pen
@deepfriedcyber
@_vault_security
@hakin9
@ingliguori
@cisagov
@gbatemp

Top Mentioned in G2:
@shubham_pen
@hakin9
@cyberwarship
@ptracesecurity
@hackinarticles
@three_cube
@rafeeq_rehman
@blueteamsec1
@imrook1337
@b0rk

Top Mentioned in G3:
@defcon
@alyssam_infosec
@ush1c
@adversaryvillag
@virtualallocex
@blackhatevents
@hacks4pancakes
@redcanary
@pl4ntl4dy
@itspmagazine

Top Mentioned in G4:
@hackinarticles
@shubham_pen
@securitytrybe
@hakin9
@cyb3rops
@sec_r0
@securzyhq
@iicsorg
@dailyosint

Top Mentioned in G5:
@programmerjoke9
@paula_piccard
@adanielhill
@veracode
@ipfconline1
@hakin9
@jblefevre60
@nekostored
@ashwin_r7
@pattyly07636548

Top Mentioned in G6:
@three_cube
@hackinarticles
@shubham_pen
@hakin9
@cyberwarship
@nobeardecho6
@tsm3301
@redhotcyber
@phishstats
@paula_piccard

Top Mentioned in G7:
@cosmos_the_best
@taylorbanks
@bsidesmelbourne
@drivingdig
@fideliscyber

Top Mentioned in G8:
@sarabadran18
@sagar__sajeev
@harshinsecurity
@impratikdabhi
@drjdrooghaag
@hackinarticles
@haneeni61853819
@t
@pethuraj

Top Mentioned in G9:
@alyssam_infosec
@mat__savage
@blowdart
@muteki_rtw
@k3n_5s
@olmaverick
@docwho76
@aprilwright
@litmoose
@zarchasmpgmr

Top Mentioned in G10:
@cybersecboardrm
@purple_sec
@fpwellman
@dinodaizovi
@cbcnews
@adamsmiller
@donlew87
@meidastouch
@axios
@nathanmcnulty

Top Tweeters
Top Tweeters in Entire Graph:
@sectest9
@chidambara09
@xaelbot
@codedailybot
@cybersecurityn8
@javascriptd
@blazedrts
@_redfrog
@botraj1
@limportant_fr

Top Tweeters in G1:
@sectest9
@chidambara09
@cybersecurityn8
@stream_caster
@dataaugmented
@periscopeislit
@rahul05ranjan
@amazingchevvolt
@fintechna
@santchiweb

Top Tweeters in G2:
@youranonriots
@calcaware
@savetonotion
@nick_barnes
@pythonroboto
@ajem_mx
@securityblog
@adrianvelascos
@foscraft
@armandnarcissek

Top Tweeters in G3:
@rvp
@k3vk4
@kas_stoner
@sudarshan_mlth
@uk_daniel_card
@_std_
@hacks4pancakes
@tiwar_sk
@drahcir_rahl
@jaysonstreet

Top Tweeters in G4:
@digitaldecoded1
@komiska
@atsen_
@01062021ad
@wizardip
@frogsc25
@i4isp
@iam_til
@cadillac_me
@alex_ismyname

Top Tweeters in G5:
@xaelbot
@codedailybot
@javascriptd
@blazedrts
@botraj1
@aaroncuddeback
@100xcode
@fabriciosx
@codewithtwitchi
@goaidev

Top Tweeters in G6:
@raivoonet
@urbanosoax
@itzzzwiz
@sesuter1
@fern_herrerajr
@aegon555
@dickson_sokoro
@barbizon_streak
@sitar_strings
@three_cube

Top Tweeters in G7:
@joqatana
@starkat1138
@smesecurity
@jonbecker
@miikelowery
@pdh_metaverse
@elfsternberg
@marquiso
@thehackologist
@comidoc

Top Tweeters in G8:
@evankirstel
@drjdrooghaag
@the__hustlerguy
@ralexjimenez
@sulefati7
@hackingdom_io
@icristerna2
@qcontrarian
@jeffkagan
@biapongkering_

Top Tweeters in G9:
@nerdpyle
@jdanton
@justthisguy
@zarchasmpgmr
@shatter242
@sqlcheesecake
@bluejays
@khaxan
@carmencrincoli
@elkentaro

Top Tweeters in G10:
@jamesvgingerich
@therickwilson
@cbsnews
@cbcnews
@wandaransom
@postopinions
@nothoodlum
@jacklasalle1
@mark3ds
@axios


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.