infosec, Twitter, 1/16/2023 8:26:47 PM, 288219


FAQ | Problem?

infosec_2023-01-16_12-15-01.xlsx
infosec_2023-01-16_12-15-01.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
January 16, 2023
Short Description:
infosec via NodeXL https://bit.ly/3XxKXPl
@sectest9
@cybersecurityn8
@hackinarticles
@shubham_pen
@0dayctf
@securitytrybe
@ptracesecurity
@0xor0ne
@davidbombal
@beefyspace

Top hashtags:
#infosec
#cybersecurity
#pentesting
#hacking
#oscp
#informationsecurity

Description:
Description
The graph represents a network of 2,527 Twitter users whose recent tweets contained "infosec", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 1/15/2023 5:00:35 PM. The network was obtained from Twitter on Monday, 16 January 2023 at 20:22 UTC.

The tweets in the network were tweeted over the 2622-day, 14-hour, 13-minute period from Wednesday, 11 November 2015 at 10:46 UTC to Monday, 16 January 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 2527
Unique Edges : 1237
Edges With Duplicates : 9600
Total Edges : 10837
Number of Edge Types : 9
Retweet : 3376
MentionsInRetweet : 3775
Mentions : 650
Tweet : 1439
MentionsInReplyTo : 1317
Replies to : 181
MentionsInQuoteReply : 42
MentionsInQuote : 34
Quote : 23
Self-Loops : 1706
Reciprocated Vertex Pair Ratio : 0.0215350635008283
Reciprocated Edge Ratio : 0.0421621621621622
Connected Components : 274
Single-Vertex Connected Components : 144
Maximum Vertices in a Connected Component : 1927
Maximum Edges in a Connected Component : 8906
Maximum Geodesic Distance (Diameter) : 11
Average Geodesic Distance : 4.061946
Graph Density : 0.000579646390635922
Modularity : 0.299675
NodeXL Version : 1.0.1.508
Data Import : The graph represents a network of 2,527 Twitter users whose recent tweets contained "infosec", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 1/15/2023 5:00:35 PM. The network was obtained from Twitter on Monday, 16 January 2023 at 20:22 UTC.

The tweets in the network were tweeted over the 2622-day, 14-hour, 13-minute period from Wednesday, 11 November 2015 at 10:46 UTC to Monday, 16 January 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : TwitterSearch2
Graph Term : infosec
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[345] http://cyberiqs.com/latestnews
[115] https://networkwalks.com/networkwalks-summary-cheatsheets/
[65] https://xsshunter.com/
[65] http://xss.ht
[56] https://atomspam.com/
[53] https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development?s=09
[44] https://orange-cyberdefense.github.io/ocd-mindmaps/img/pentest_ad_dark_2022_11.svg
[44] https://adam-toscher.medium.com/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa
[44] https://ultimatewindowssecurity.com/securitylog/quickref/Default.aspx
[43] https://hakin9.org/wef-wifi-exploitation-framework/

Top URLs in Tweet in G1:
[345] http://cyberiqs.com/latestnews
[56] https://atomspam.com/
[14] https://phishstats.info/
[10] https://infosec-jobs.com/job/22116-it-security-engineer/
[8] https://www.csoonline.com/article/3675542/8-strange-ways-employees-can-accidently-expose-data.html
[7] https://go.dhs.gov/Z3Q
[7] https://www.scoop.it/topic/cybersecurity-leadership/p/4139925007/2023/01/15/cios-find-it-most-difficult-to-solve-cybersecurity-challenges?utm_medium=social&utm_source=twitter
[6] https://pentestmag.com/download/preview-wireless-pentesting-toolkit/
[6] https://www.scoop.it/topic/cybersecurity-leadership/p/4139924339/2023/01/15/cyber-insurance-a-must-have-not-a-nice-to-have?utm_medium=social&utm_source=twitter
[6] https://www.cpomagazine.com/data-protection/making-data-proactive-to-manage-risk/?utm_source=twitter&utm_medium=social&utm_campaign=novashare

Top URLs in Tweet in G2:
[9] https://securityzines.com/
[2] https://forms.gle/p5gYANJNDNbxBiE27
[2] https://twitter.com/hackinarticles/status/1614154516680822784/photo/1
[2] https://twitter.com/hackinarticles/status/1614509683947229184/photo/1
[1] https://twitter.com/hackinarticles/status/1614510073992339456/photo/1
[1] https://twitter.com/hackinarticles/status/1613992283090845696/photo/1
[1] https://twitter.com/hackinarticles/status/1613797375541407744/photo/1
[1] https://twitter.com/hackinarticles/status/1613917458200678402/photo/1
[1] https://twitter.com/hackinarticles/status/1611805712178630656/photo/1
[1] https://twitter.com/hackinarticles/status/1614510847203893249/photo/1

Top URLs in Tweet in G3:
[82] https://networkwalks.com/networkwalks-summary-cheatsheets/
[25] https://ultimatewindowssecurity.com/securitylog/quickref/Default.aspx
[10] https://community.fs.com/blog/tcpip-vs-osi-whats-the-difference-between-the-two-models.html
[3] https://helloitsliam.com/2015/06/03/web-app-penetration-testing-infographic/
[3] https://twitter.com/Shubham_pen/status/1614212101618147331/photo/1
[3] https://xmind.app/m/vQuTSG/#
[3] https://i.pinimg.com/originals/4e/02/1d/4e021dffb587cf7e72101df6859888ad.jpg
[3] https://securityzines.com/
[3] https://hacklido.com/blog/158
[2] https://kubernetes.io/docs/reference/kubectl/cheatsheet/

Top URLs in Tweet in G4:
[7] https://www.helpnetsecurity.com/2023/01/15/week-in-review-chatgpt-as-an-infosec-assistant-google-offers-help-to-eu-cybersecurity-startups/
[6] https://twinybots.ch/
[6] https://www.helpnetsecurity.com/2022/10/04/mandatory-password-expiration-helping-or-hurting-password-security/
[4] https://twitter.com/JustChillieh/status/1614559182333542401/photo/1
[4] https://twitter.com/win3zz/status/1613467576327094275/photo/1
[3] https://infosec.exchange/@SecureOwl/109689666314013084
[3] https://www.helpnetsecurity.com/2023/01/15/week-in-review-chatgpt-as-an-infosec-assistant-google-offers-help-to-eu-cybersecurity-startups/?utm_source=dlvr.it&utm_medium=twitter
[2] https://infosec.exchange/@jtk
[2] https://techcrunch.com/2023/01/13/sealed-buys-sensor-startup-infisense-to-fuel-energy-saving-services/
[2] https://infosec.exchange/@strandjs/109689389774456007

Top URLs in Tweet in G5:
[2] https://twitter.com/0dayCTF/status/1394427574152011777/photo/1
[2] https://orange-cyberdefense.github.io/ocd-mindmaps/img/pentest_ad_dark_2022_11.svg
[2] https://adam-toscher.medium.com/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa
[1] https://github.com/Th0h0/autossrf
[1] https://twitter.com/0dayCTF/status/1593996108207984642/photo/1
[1] https://pastebin.com/rKpsMp0g
[1] https://twitter.com/0dayCTF/status/1576942592868372480/photo/1
[1] https://github.com/lefayjey/linWinPwn
[1] https://twitter.com/0dayCTF/status/1614280560234401792/photo/1
[1] https://github.com/aas-n/spraykatz

Top URLs in Tweet in G6:
[33] https://hakin9.org/wef-wifi-exploitation-framework/
[13] https://github.com/efchatz/WPAxFuzz
[13] https://learn.microsoft.com/en-us/windows-server/identity/securing-privileged-access/reference-tools-logon-types
[9] https://michaelkoczwara.medium.com/sliver-c2-implant-analysis-62773928097f
[9] https://twitter.com/ptracesecurity/status/1614668920073371656/photo/1
[8] https://github.com/cisagov/ScubaGear
[8] https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development?s=09
[7] https://www.reversinglabs.com/blog/january-2023-updates-to-reversinglabs-threat-analysis-and-hunting-solution?utm_content=234101001&utm_medium=social&utm_source=twitter&hss_channel=tw-146486666
[7] https://ultimatewindowssecurity.com/securitylog/quickref/Default.aspx
[4] https://twitter.com/ptracesecurity/status/1614064821674151939/photo/1

Top URLs in Tweet in G7:
[54] https://xsshunter.com/
[54] http://xss.ht
[7] https://osv.dev
[3] https://sploitus.com
[3] https://twitter.com/0x0SojalSec/status/1612851177590509568/photo/1
[3] https://www.configure8.io/blog/log4j-why-organizations-are-failing-to-remediate-this-risk?utm_source=thenewstack&utm_medium=twitter&utm_campaign=platform
[3] https://networkwalks.com/networkwalks-summary-cheatsheets/
[2] https://adamjsturge.medium.com/easy-xsshunter-express-setup-script-d5a66039f7b6?sk=52394aa4a2d66779ffcaeaf7cab63af9
[2] https://www.reddit.com/r/blueteamsec/comments/zlf6ei/fbi_infragard_member_data_breached/?utm_source=dlvr.it&utm_medium=twitter
[2] https://www.reddit.com/r/blueteamsec/comments/zmazej/unusual_cache_poisoning_between_akamai_and_s3/?utm_source=dlvr.it&utm_medium=twitter

Top URLs in Tweet in G8:
[32] https://orange-cyberdefense.github.io/ocd-mindmaps/img/pentest_ad_dark_2022_11.svg
[32] https://adam-toscher.medium.com/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa
[17] https://blog.stazot.com/ssh-key-injection-google-cloud/
[12] https://github.com/daffainfo/AllAboutBugBounty
[4] https://www.reversinglabs.com/blog/january-2023-updates-to-reversinglabs-threat-analysis-and-hunting-solution?utm_content=234101001&utm_medium=social&utm_source=twitter&hss_channel=tw-146486666
[4] https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development?s=09
[3] https://medium.com/tenable-techblog/smb-access-is-denied-caused-by-anti-ntlm-relay-protection-659c60089895
[2] https://pentestmag.com/download/preview-wireless-pentesting-toolkit/
[2] https://securityzines.com/
[2] https://medium.com/m/global-identity-2?redirectUrl=https%3A%2F%2Finfosecwriteups.com%2Fpost-exploitation-basics-in-active-directory-enviorment-by-hashar-mujahid-d46880974f87

Top URLs in Tweet in G9:
[4] https://networkwalks.com/networkwalks-summary-cheatsheets/
[2] https://twitter.com/JimHarris/status/1610659639619915777/photo/1
[2] https://twitter.com/JimHarris/status/1604205820438355969/photo/1
[2] https://orange-cyberdefense.github.io/ocd-mindmaps/img/pentest_ad_dark_2022_11.svg
[2] https://adam-toscher.medium.com/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa
[2] https://labs.ksec.co.uk/product/sparrows-tuxedo-royale/
[1] https://www.youtube.com/watch?v=8MIIeIa25tE&feature=youtu.be

[1] https://twitter.com/davidbombal/status/1614639254776193026/photo/1
[1] https://twitter.com/JimHarris/status/1614641577325985792/photo/1
[1] https://twitter.com/CSCPROF/status/1611411863442493441/video/1

Top URLs in Tweet in G10:
[35] https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development?s=09
[7] https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x0-debugging.html
[4] https://twitter.com/0xor0ne/status/1614344143072903171/photo/1
[4] https://twitter.com/0xor0ne/status/1610908985888063488/photo/1
[4] https://twitter.com/0xor0ne/status/1608878124594339846/photo/1
[4] https://twitter.com/0xor0ne/status/1613083304135106560/photo/1
[4] https://twitter.com/0xor0ne/status/1614706498097090560/photo/1
[4] https://twitter.com/0xor0ne/status/1614178049066401793/photo/1
[4] https://twitter.com/0xor0ne/status/1613634478080987141/photo/1
[4] https://twitter.com/0xor0ne/status/1608372358259040256/photo/1

Top Domains
Top Domains in Tweet in Entire Graph:
[864] twitter.com
[345] cyberiqs.com
[120] github.com
[119] networkwalks.com
[113] paper.li
[92] medium.com
[65] xsshunter.com
[65] xss.ht
[62] github.io
[56] atomspam.com

Top Domains in Tweet in G1:
[345] cyberiqs.com
[296] twitter.com
[56] atomspam.com
[54] nationalcybersecurity.com
[27] github.com
[25] scoop.it
[19] infosec-jobs.com
[18] hacklido.com
[16] paper.li
[15] helpnetsecurity.com

Top Domains in Tweet in G2:
[31] twitter.com
[9] securityzines.com
[2] forms.gle
[1] ultimatewindowssecurity.com
[1] gitbook.io

Top Domains in Tweet in G3:
[84] networkwalks.com
[29] twitter.com
[25] ultimatewindowssecurity.com
[21] cyberfeed.io
[10] fs.com
[3] helloitsliam.com
[3] xmind.app
[3] pinimg.com
[3] securityzines.com
[3] hacklido.com

Top Domains in Tweet in G4:
[55] twitter.com
[25] infosec.exchange
[16] helpnetsecurity.com
[11] paper.li
[10] techcrunch.com
[6] twinybots.ch
[5] cybernoz.com
[4] github.com
[3] bleepingcomputer.com
[3] securityaffairs.com

Top Domains in Tweet in G5:
[9] twitter.com
[7] github.com
[2] github.io
[2] medium.com
[1] pastebin.com
[1] ultimatewindowssecurity.com
[1] networkwalks.com
[1] paper.li

Top Domains in Tweet in G6:
[78] twitter.com
[33] hakin9.org
[29] github.com
[17] medium.com
[13] microsoft.com
[11] kitploit.com
[11] pentesteracademy.com
[8] gitbook.io
[7] reversinglabs.com
[7] ultimatewindowssecurity.com

Top Domains in Tweet in G7:
[54] xsshunter.com
[54] xss.ht
[20] twitter.com
[11] reddit.com
[7] osv.dev
[4] medium.com
[3] sploitus.com
[3] configure8.io
[3] networkwalks.com
[2] start.me

Top Domains in Tweet in G8:
[38] medium.com
[32] github.io
[20] github.com
[17] stazot.com
[10] twitter.com
[4] reversinglabs.com
[4] gitbook.io
[3] securityzines.com
[3] paper.li
[2] pentestmag.com

Top Domains in Tweet in G9:
[9] twitter.com
[4] networkwalks.com
[3] co.uk
[2] github.io
[2] medium.com
[1] youtube.com
[1] securityzines.com
[1] github.com
[1] ultimatewindowssecurity.com
[1] hakin9.org

Top Domains in Tweet in G10:
[82] twitter.com
[35] gitbook.io
[14] github.io
[9] k3170makan.com
[5] cybergeeks.tech
[5] medium.com
[5] github.com
[4] blogspot.com
[3] nccgroup.com
[3] infosecwriteups.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3321] infosec
[2948] cybersecurity
[1065] pentesting
[868] hacking
[847] oscp
[704] informationsecurity
[693] ransomware
[648] cloudsecurity
[591] redteam
[580] malware



Top Hashtags in Tweet in G1:
[1710] infosec
[1648] cybersecurity
[666] ransomware
[639] cloudsecurity
[598] hacking
[538] malware
[496] cyberattack
[475] infosecurity
[419] threatintel
[418] privacy

Top Hashtags in Tweet in G2:
[260] cybersecuritytips
[247] infosec
[246] cybersecurity
[245] pentesting
[244] oscp
[236] redteam
[194] informationsecurity
[181] cissp
[11] cybersec
[11] networking

Top Hashtags in Tweet in G3:
[235] infosec
[225] cybersecurity
[197] pentesting
[173] oscp
[120] informationsecurity
[60] hacking
[60] redteam
[55] cissp
[29] cybersec
[21] technology

Top Hashtags in Tweet in G4:
[138] infosec
[78] cybersecurity
[22] technology
[21] security
[20] cybersec
[18] pentesting
[18] informationsecurity
[17] linux
[16] 100daysofcode
[14] hacking

Top Hashtags in Tweet in G5:
[19] infosec
[17] cybersecurity
[12] cybersecuritytips
[10] pentesting
[9] oscp
[8] ctf
[8] redteam
[8] informationsecurity
[7] bugbountytips
[6] cissp

Top Hashtags in Tweet in G6:
[183] infosec
[153] cybersecurity
[123] pentesting
[44] exploit
[44] redteam
[31] pentest
[26] oscp
[24] informationsecurity
[23] hacking
[17] cybersecuritytips

Top Hashtags in Tweet in G7:
[63] infosec
[32] bugbountytip
[30] cybersecurity
[17] pentesting
[12] oscp
[10] bugbountytips
[10] cyber
[9] cybersecuritytips
[8] threathunting
[7] redteam

Top Hashtags in Tweet in G8:
[60] infosec
[37] cybersecurity
[29] pentesting
[16] oscp
[16] bugbounty
[14] redteam
[12] informationsecurity
[12] cybersecuritytips
[10] bugbountytips
[9] hacking

Top Hashtags in Tweet in G9:
[43] cybersecurity
[40] infosec
[20] pentesting
[19] informationsecurity
[17] oscp
[14] redteam
[13] security
[12] cissp
[9] hacking
[9] cybersecuritytips

Top Hashtags in Tweet in G10:
[94] infosec
[52] exploit
[44] linux
[43] kernel
[39] cybersecurity
[21] pentesting
[13] oscp
[10] redteam
[10] informationsecurity
[8] cybersecuritytips

Top Words
Top Words in Tweet in Entire Graph:
[3320] #infosec
[2950] #cybersecurity
[1065] #pentesting
[868] #hacking
[847] #oscp
[704] #informationsecurity
[693] #ransomware
[648] #cloudsecurity
[591] #redteam
[580] #malware

Top Words in Tweet in G1:
[1710] #infosec
[1650] #cybersecurity
[666] #ransomware
[639] #cloudsecurity
[598] #hacking
[538] #malware
[496] #cyberattack
[475] #infosecurity
[424] #cyber
[421] #threatintel

Top Words in Tweet in G2:
[260] #cybersecuritytips
[247] #infosec
[246] #cybersecurity
[245] #pentesting
[244] #oscp
[236] #redteam
[222] hackinarticles
[194] #informationsecurity
[181] #cissp
[157] day

Top Words in Tweet in G3:
[235] #infosec
[225] #cybersecurity
[197] #pentesting
[173] #oscp
[164] shubham_pen
[137] credit
[120] #informationsecurity
[99] best
[85] cheat
[85] sheet

Top Words in Tweet in G4:
[137] #infosec
[78] #cybersecurity
[56] infosec
[33] security
[24] cybersecurity
[22] #technology
[21] #security
[20] #cybersec
[19] exchange
[19] week

Top Words in Tweet in G5:
[132] 0dayctf
[129] directory
[129] active
[126] crackmapexec
[126] vulnerability
[126] ldapdomaindump
[126] scan
[126] bloodhound
[126] scanner
[126] linwinpwn

Top Words in Tweet in G6:
[183] #infosec
[153] #cybersecurity
[123] #pentesting
[97] ptracesecurity
[45] exploitation
[44] #redteam
[44] #exploit
[38] security
[37] wifi
[35] cyberwarship

Top Words in Tweet in G7:
[63] #infosec
[62] taksec
[59] xss
[55] server
[54] hunter
[54] feb
[54] down
[54] build
[54] starting
[54] 1st

Top Words in Tweet in G8:
[60] #infosec
[53] active
[53] directory
[44] works
[44] dns
[41] vulnerability
[37] #cybersecurity
[35] access
[34] attacks
[34] resources

Top Words in Tweet in G9:
[85] next
[85] bank
[85] billionaire
[85] video
[85] yourself
[85] youtube
[85] protect
[85] hacked
[84] davidbombal
[43] #cybersecurity

Top Words in Tweet in G10:
[98] 0xor0ne
[94] #infosec
[87] linux
[83] kernel
[59] series
[56] exploitation
[52] #exploit
[45] intro
[44] #linux
[43] #kernel

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[1157] #infosec,#cybersecurity
[844] #pentesting,#oscp
[528] #cybersecurity,#cybersecuritytips
[527] #cybersecuritytips,#pentesting
[485] #cybersecurity,#infosec
[476] #malware,#ransomware
[441] #infosec,#infosecurity
[437] #oscp,#redteam
[431] #infosecurity,#cybersecurity
[420] #cybersecurity,#threatintel

Top Word Pairs in Tweet in G1:
[468] #malware,#ransomware
[437] #infosec,#infosecurity
[428] #infosecurity,#cybersecurity
[418] #cybersecurity,#threatintel
[409] #infosec,#cybersecurity
[385] #threatintel,#threatintelligence
[372] #threatintelligence,#hacking
[359] #hacking,#cybernews
[351] #cyber,#threathunting
[351] #cybernews,#cyberattack

Top Word Pairs in Tweet in G2:
[246] #infosec,#cybersecurity
[244] #pentesting,#oscp
[244] #cybersecurity,#cybersecuritytips
[244] #cybersecuritytips,#pentesting
[236] #oscp,#redteam
[194] #redteam,#informationsecurity
[181] #informationsecurity,#cissp
[157] day,#infosec
[157] pic,day
[144] #cissp,#c

Top Word Pairs in Tweet in G3:
[219] #infosec,#cybersecurity
[180] #cybersecurity,#pentesting
[173] #pentesting,#oscp
[137] credit,#infosec
[108] #oscp,#informationsecurity
[93] shubham_pen,best
[85] cheat,sheet
[76] sheet,credit
[59] best,tcp
[59] #informationsecurity,#hacking

Top Word Pairs in Tweet in G4:
[23] #infosec,#cybersecurity
[19] #cybersecurity,#infosec
[18] infosec,exchange
[15] offers,help
[15] week,review
[15] infosec,assistant
[15] eu,cybersecurity
[15] help,eu
[14] review,chatgpt
[14] cybersecurity,startups

Top Word Pairs in Tweet in G5:
[129] active,directory
[126] crackmapexec,ldapdomaindump
[126] linwinpwn,active
[126] help,impacket
[126] scan,help
[126] bloodhound,crackmapexec
[126] directory,vulnerability
[126] scanner,scan
[126] vulnerability,scanner
[126] impacket,bloodhound

Top Word Pairs in Tweet in G6:
[86] #cybersecurity,#infosec
[34] #infosec,#cybersecurity
[33] wef,wifi
[33] framework,#pentesting
[33] wifi,exploitation
[33] exploitation,framework
[33] #exploit,#cybersecurity
[33] #pentesting,#exploit
[32] ptracesecurity,wef
[26] #pentesting,#oscp

Top Word Pairs in Tweet in G7:
[54] down,starting
[54] hunter,server
[54] going,down
[54] starting,feb
[54] build,xss
[54] xss,hunter
[54] 1st,build
[54] feb,1st
[53] taksec,going
[53] server,ea

Top Word Pairs in Tweet in G8:
[53] active,directory
[44] dns,works
[32] initial,access
[32] resources,roadmap
[32] mitm6,attacks
[32] directory,resources
[32] roadmap,initial
[32] access,mitm6
[31] nullshock1,active
[23] #infosec,#cybersecurity

Top Word Pairs in Tweet in G9:
[85] next,protect
[85] yourself,youtube
[85] bank,next
[85] protect,yourself
[85] hacked,billionaire
[85] youtube,video
[85] billionaire,bank
[84] davidbombal,hacked
[20] #infosec,#cybersecurity
[17] #pentesting,#oscp

Top Word Pairs in Tweet in G10:
[82] linux,kernel
[44] kernel,exploitation
[43] intro,series
[42] #linux,#kernel
[42] #exploit,#infosec
[38] #kernel,#exploit
[37] years,old
[37] couple,years
[37] old,still
[35] fuzzing,credits

Top Replied-To
Top Mentioned
Top Mentioned in Entire Graph:
@hackinarticles
@shubham_pen
@0dayctf
@ptracesecurity
@securitytrybe
@0xor0ne
@tech
@davidbombal
@cyberiqs_
@taksec

Top Mentioned in G1:
@tech
@cyberiqs_
@hackinarticles
@atomspam
@shubham_pen
@hackwithnichola
@damain_cyber
@jinibabd
@classiqagogo2
@great_louis1

Top Mentioned in G2:
@hackinarticles
@cm_alliance
@securitytube
@shubham_pen
@0xor0ne
@three_cube
@cyberwarship
@viehgroup

Top Mentioned in G3:
@shubham_pen
@hackinarticles
@infoseccomm
@hacklido
@wiebetech
@alexisbrignoni
@aacle_
@rdpsnitch
@securitytrybe
@thehackersnews

Top Mentioned in G4:
@infosec_coder
@strandjs
@cdwgwagov
@jtkristoff
@desagehack

Top Mentioned in G5:
@0dayctf
@hackinarticles
@t3l3machus
@shubham_pen
@nullshock1
@th0h0
@aas_s3curity
@d3ext
@muirlandoracle
@ptracesecurity

Top Mentioned in G6:
@ptracesecurity
@cyberwarship
@hackinarticles
@shubham_pen
@securitytube
@0xor0ne
@securitytrybe
@cioamaro
@cybermat3rial
@windows

Top Mentioned in G7:
@taksec
@marcos_iaf
@0x0sojalsec
@0dayctf
@hetmehtaa
@blueteamsec1
@shubham_pen
@0reosec
@ptracesecurity
@hackinarticles

Top Mentioned in G8:
@nullshock1
@0x1shu
@7h3h4ckv157
@payloadartist
@sivaneshashok
@kl_sree
@ptracesecurity
@hackinarticles
@akita_zen
@shubham_pen

Top Mentioned in G9:
@davidbombal
@shubham_pen
@hackinarticles
@jimharris
@cscprof
@securitytrybe
@0dayctf
@kingcoolvikas
@ptracesecurity
@nullshock1

Top Mentioned in G10:
@0xor0ne
@nccgroupinfosec
@nikahverse
@hackinarticles
@ptracesecurity
@shubham_pen
@0dayctf
@geekscyber
@theflow0

Top Tweeters
Top Tweeters in Entire Graph:
@sectest9
@chidambara09
@jurylady5
@cybersecurityn8
@javascriptd
@bannerite
@evankirstel
@thehill
@rahul05ranjan
@dataaugmented

Top Tweeters in G1:
@sectest9
@chidambara09
@cybersecurityn8
@thehill
@rahul05ranjan
@dataaugmented
@periscopeislit
@ucloudify
@andrewmorrisuk
@sabcnews

Top Tweeters in G2:
@3vil_qu33n
@xy_krasnodon
@adam_it_
@alfreddelarosa
@smhjan
@k_athanasi
@infogon
@landisharthur_
@worawutg
@waffirian_

Top Tweeters in G3:
@abubakarmundir
@enricofrasca3
@1sandy_n_austin
@ideaspbusiness
@apostolwario
@hibicimidimi
@fyrumunna
@impofigu
@howtopam
@abdullahalzakry

Top Tweeters in G4:
@alizardx
@youranonriots
@joviannfeed
@sec_cyber
@cyberguardnews
@halfeatenmind
@ton_aarts
@smesecurity
@poseidontpa
@cdwgwagov

Top Tweeters in G5:
@niranam_salt
@thedevilops
@essobi
@good_sector
@sskras
@chibuezeogah
@piz69
@jkopacko
@brightzeed
@shipcod3

Top Tweeters in G6:
@ayirpelle
@windows
@dariosailor86
@jewhaditm
@securitytube
@alternative200
@aldana_angel
@georgemappjr
@barbizon_streak
@reveldes_vdv

Top Tweeters in G7:
@_blackmac
@offethhacker
@thenewstack
@dinosn
@sendyournft
@antiartificial
@mfatah281
@sumgr0
@sigi2543
@scalefree

Top Tweeters in G8:
@thagedhele
@michael_warren
@mythicalcmd
@m3g9tr0n
@shawnetuma
@fprado28
@puneethrebel9
@erumichael_
@smartideas01
@secure_overflow

Top Tweeters in G9:
@justafandavid
@justthisguy
@mgg_2012
@akawombat42
@acarr642
@0xblock0
@dah1122_
@patrick2feather
@andres_riscv
@jimharris

Top Tweeters in G10:
@savetonotion
@rejectionking
@0x4d_
@pc65049955
@ali19baba
@nono2357
@m_albunni1
@proxyqtr5
@gawojtek
@niktinroya


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.