infosec, Twitter, 12/26/2022 8:44:42 PM, 287037


FAQ | Problem?

infosec_2022-12-26_12-15-01.xlsx
infosec_2022-12-26_12-15-01.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
December 26, 2022
Short Description:
infosec via NodeXL https://bit.ly/3WGFcOM
@hetmehtaa
@hackinarticles
@cybersecurityn8
@nandanlohitaksh
@sectest9
@shubham_pen
@cyberdfir
@0xor0ne
@beefyspace
@three_cube

Top hashtags:
#infosec
#cybersecurity
#pentesting
#hacking
#oscp
#informationsecurity
#redteam

Description:
Description
The graph represents a network of 3,998 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Monday, 26 December 2022 at 20:25 UTC.

The requested start date was Monday, 26 December 2022 at 01:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 1-day, 11-hour, 1-minute period from Saturday, 24 December 2022 at 13:58 UTC to Monday, 26 December 2022 at 01:00 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3998
Unique Edges : 1859
Edges With Duplicates : 12830
Total Edges : 14689
Number of Edge Types : 5
Retweet : 5333
MentionsInRetweet : 6028
Tweet : 2026
Mentions : 1092
Replies to : 210
Self-Loops : 2097
Reciprocated Vertex Pair Ratio : 0.0130637079455977
Reciprocated Edge Ratio : 0.0257904963787317
Connected Components : 435
Single-Vertex Connected Components : 262
Maximum Vertices in a Connected Component : 3118
Maximum Edges in a Connected Component : 13471
Maximum Geodesic Distance (Diameter) : 12
Average Geodesic Distance : 4.007271
Graph Density : 0.000354255186136976
Modularity : 0.332074
NodeXL Version : 1.0.1.508
Data Import : The graph represents a network of 3,998 Twitter users whose tweets in the requested range contained "infosec", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Monday, 26 December 2022 at 20:25 UTC.

The requested start date was Monday, 26 December 2022 at 01:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 1-day, 11-hour, 1-minute period from Saturday, 24 December 2022 at 13:58 UTC to Monday, 26 December 2022 at 01:00 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : GraphServerTwitterSearch
Graph Term : infosec
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[290] https://github.com/shieldfy/API-Security-Checklist
[117] https://www.inversecos.com/2022/06/how-to-reverse-engineer-and-patch-ios.html
[92] https://github.com/Anugrahsr/Awesome-web3-Security
[84] https://infosec.exchange/@chiesennegs/109570145849933257
[80] https://github.com/ashemery/LinuxForensics
[73] https://www.comparitech.com/net-admin/nmap-nessus-cheat-sheet/
[72] https://github.com/Ignitetechnologies/Windows-Privilege-Escalation
[66] https://www.helpnetsecurity.com/2022/10/04/mandatory-password-expiration-helping-or-hurting-password-security/
[62] https://twinybots.ch/
[58] https://github.com/Ignitetechnologies/Credential-Dumping

Top URLs in Tweet in G1:
[66] https://www.helpnetsecurity.com/2022/10/04/mandatory-password-expiration-helping-or-hurting-password-security/
[39] https://www.csoonline.com/article/3675542/8-strange-ways-employees-can-accidently-expose-data.html
[37] https://phishstats.info/
[35] https://twinybots.ch/
[13] https://www.amazon.com/Kill-Chain-This-Digital-Dark-ebook/dp/B09YS4D1H5/?geniuslink=true
[12] https://edition.cnn.com/2022/12/21/politics/white-house-cyber-official-chris-inglis-to-step-down/index.html?utm_content=buffer021eb&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[12] https://hacklido.com/d/162-privileges-escalation-techniques-basic-to-advanced-in-linux-part-2
[12] https://github.com/Ignitetechnologies/Credential-Dumping
[11] https://github.com/shieldfy/API-Security-Checklist
[10] https://www.darkreading.com/attacks-breaches/holiday-spam-phishing-campaigns-challenge-retailers?utm_source=dlvr.it&utm_medium=twitter

Top URLs in Tweet in G2:
[112] https://www.inversecos.com/2022/06/how-to-reverse-engineer-and-patch-ios.html
[57] https://github.com/ashemery/LinuxForensics
[15] https://limitedresults.com/2019/08/pwn-the-esp32-crypto-core/
[13] https://github.com/shieldfy/API-Security-Checklist
[12] https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/
[12] https://github.com/jart/blink
[11] https://limitedresults.com/2021/06/enter-the-efm32-gecko/
[9] https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/
[9] https://github.com/certsocietegenerale/IRM
[8] https://limitedresults.com/2019/11/pwn-the-esp32-forever-flash-encryption-and-sec-boot-keys-extraction/

Top URLs in Tweet in G3:
[2] https://book.thegurusec.com/certifications/certified-ethical-hacker-practical
[2] https://nx7.me/posts/cehreview/
[2] https://paper.li/1DavidClarke/1565290165?share_id=19606d20-8485-11ed-8842-fa163e6ccaff
[1] https://immpetus.gitbook.io/ceh-practical
[1] https://github.com/sampritdas8/Ec-Council-CEH-Practical--Guide-For-Exam/blob/main/CEH(Practical).md
[1] https://github.com/CyberSecurityUP/Guide-CEH-Practical-Master
[1] https://infosec-jobs.com/job/21034-director-security-architecture/
[1] https://github.com/ashemery/LinuxForensics
[1] https://github.com/certsocietegenerale/IRM
[1] https://paper.li/e-1470391311?share_id=7b1787f0-843b-11ed-b13a-fa163e1a70d7

Top URLs in Tweet in G4:
[41] https://github.com/Ignitetechnologies/Windows-Privilege-Escalation
[26] https://securityzines.com/
[24] https://github.com/Ignitetechnologies/Credential-Dumping
[8] https://github.com/Ignitetechnologies/HackTheBox-CTF-Writeups
[3] https://www.hackingarticles.in/backdoor-hackthebox-walkthrough/
[3] https://www.reddit.com/r/blueteamsec/comments/z3bvzu/an_indepth_look_at_the_north_korean_threat_actor/?utm_source=dlvr.it&utm_medium=twitter
[3] https://www.reddit.com/r/blueteamsec/comments/z2pbsc/mitre_attck_coverage_assessment_how_to_document/?utm_source=dlvr.it&utm_medium=twitter
[2] https://www.reddit.com/r/blueteamsec/comments/z2qpr1/vulnerable_sdk_components_lead_to_supply_chain/?utm_source=dlvr.it&utm_medium=twitter
[2] https://www.reddit.com/r/blueteamsec/comments/z2qba0/how_the_fbi_stumbled_in_the_war_on_cybercrime/?utm_source=dlvr.it&utm_medium=twitter
[1] https://twitter.com/i/web/status/1604722181371355136

Top URLs in Tweet in G5:
[226] https://github.com/shieldfy/API-Security-Checklist
[68] https://github.com/Anugrahsr/Awesome-web3-Security
[4] https://github.com/magnologan/awesome-k8s-security
[4] https://github.com/CyberSecurityUP/Cloud-Security-Attacks
[3] https://github.com/hahwul/DevSecOps
[3] https://securityzines.com/
[3] https://github.com/Ignitetechnologies/Windows-Privilege-Escalation
[2] https://github.com/Samsar4/Ethical-Hacking-Labs
[2] https://github.com/alvin-tosh/Malware-Exhibit
[2] https://github.com/jassics/security-study-plan

Top URLs in Tweet in G6:
[23] https://infosec.exchange/@chiesennegs/109570145849933257
[9] https://news.ycombinator.com/item?id=34121583
[6] https://infosec.exchange/@briankrebs/109569533436686804
[4] https://infosec.exchange/@chiesennegs/109570145849933257?utm_source=dlvr.it&utm_medium=twitter
[4] https://twinybots.ch/
[2] https://tryhackme.com/room/adventofcyber4
[2] https://www.gocleared.com/jobs/179593941-it-specialist-infosec-at-military-sealift-command?utm_source=dlvr.it&utm_medium=twitter
[2] https://infosec.exchange/@VSheHer
[2] https://hydraxchain.medium.com/unlimited-blockchain-security-resources-a0527dd8ac9c
[2] https://t.me/+hIuHwW6zz4cxYWI0

Top URLs in Tweet in G7:
[8] https://github.com/shieldfy/API-Security-Checklist
[5] https://github.com/Anugrahsr/Awesome-web3-Security
[4] https://safe.s.id/r?url=https://www.nakanosec.com/2021/08/mempelajari-attack-type-brute-force.html
[4] https://safe.s.id/r?url=https://info.nakanosec.com/2021/08/cara-mengatasi-whatsapp-mod-gagal.html
[4] https://bugcrowd.com/AnkitSingh
[3] https://bugbountyguide.org/2022/12/23/understand-the-game-of-http-request-and-response/
[3] https://safe.s.id/r?url=https://www.nakanosec.com
[3] https://www.nakanosec.com/2021/08/membuat-online-subdomain-scanner-dengan.html
[3] https://safe.s.id/r?url=https://www.nakanosec.com/2021/07/tips-belajar-hacking-otodidak-untuk.html
[3] https://safe.s.id/r?url=https://info.nakanosec.com/

Top URLs in Tweet in G8:
[53] https://www.comparitech.com/net-admin/nmap-nessus-cheat-sheet/
[23] https://github.com/sbousseaden/Slides/blob/master/Hunting%20MindMaps/PNG/Hunting_Security_Log.png
[21] https://github.com/Cyber-Guy1/API-SecurityEmpire/blob/main/assets/API%20Pentesting%20Mindmap%20ATTACK.pdf
[11] https://github.com/shieldfy/API-Security-Checklist
[10] https://securityzines.com/
[9] https://foxutech.com/what-is-dns-and-how-it-works/
[9] https://wlanprofessionals.com/802-11-wireshark-filters-chart/
[6] https://github.com/ashemery/LinuxForensics
[5] https://in.pinterest.com/pin/456482112206018987/
[5] https://github.com/Ignitetechnologies/Windows-Privilege-Escalation

Top URLs in Tweet in G9:
[7] https://github.com/shieldfy/API-Security-Checklist
[5] https://www.youtube.com/watch?v=GudY7XYouRk&feature=youtu.be

[5] https://www.professormesser.com/security-plus/sy0-401/christmas-tree-attack-2/
[3] https://www.comparitech.com/net-admin/nmap-nessus-cheat-sheet/
[3] https://www.youtube.com/watch?v=ANPtqTNLAY4&feature=youtu.be

[2] https://www.hackers-arise.com/post/2016/10/16/Web-App-Hacking-Getting-Started-with-OWASP-ZAP
[2] https://securityzines.com/
[2] https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/
[2] https://github.com/Anugrahsr/Awesome-web3-Security
[1] https://www.hackers-arise.com/post/2018/11/26/metasploit-basics-part-21-post-exploitation-with-mimikatz

Top URLs in Tweet in G10:
[6] https://github.com/shieldfy/API-Security-Checklist
[3] https://github.com/Cyber-Guy1/API-SecurityEmpire/blob/main/assets/API%20Pentesting%20Mindmap%20ATTACK.pdf
[3] https://github.com/Ignitetechnologies/Windows-Privilege-Escalation
[3] https://www.udemy.com/course/offensive-csharp/?referralCode=58C5C26B37F442CA71D9
[2] https://github.com/ashemery/LinuxForensics
[2] https://programmatic.solutions/68f4sj/no-handshake-from-airodump
[1] https://github.com/Ignitetechnologies/Credential-Dumping
[1] https://twitter.com/i/web/status/1606308857323565057
[1] https://twitter.com/i/web/status/1606850932960276484
[1] https://hacklido.com/d/162-privileges-escalation-techniques-basic-to-advanced-in-linux-part-2

Top Domains
Top Domains in Tweet in Entire Graph:
[1242] twitter.com
[834] github.com
[157] paper.li
[155] infosec.exchange
[117] inversecos.com
[74] helpnetsecurity.com
[73] comparitech.com
[67] hacklido.com
[62] twinybots.ch
[61] csoonline.com

Top Domains in Tweet in G1:
[785] twitter.com
[90] github.com
[72] helpnetsecurity.com
[59] csoonline.com
[52] cyberfeed.io
[51] darkreading.com
[51] nationalcybersecurity.com
[45] bleepingcomputer.com
[41] hacklido.com
[37] paper.li

Top Domains in Tweet in G2:
[138] github.com
[112] inversecos.com
[43] limitedresults.com
[21] twitter.com
[21] github.io
[14] paper.li
[13] quarkslab.com
[9] medium.com
[7] securityaffairs.co
[5] synacktiv.com

Top Domains in Tweet in G3:
[4] github.com
[4] paper.li
[3] twitter.com
[2] thegurusec.com
[2] nx7.me
[1] gitbook.io
[1] infosec-jobs.com

Top Domains in Tweet in G4:
[75] github.com
[42] twitter.com
[26] securityzines.com
[12] reddit.com
[3] hackingarticles.in
[1] forms.gle
[1] eforensicsmag.com
[1] limitedresults.com
[1] hex-rays.com
[1] hacklido.com

Top Domains in Tweet in G5:
[323] github.com
[3] securityzines.com
[2] github.io
[1] twitter.com
[1] limitedresults.com
[1] paper.li
[1] pinterest.com
[1] sarajevotimes.com
[1] foxutech.com

Top Domains in Tweet in G6:
[149] twitter.com
[58] infosec.exchange
[28] paper.li
[24] github.com
[9] ycombinator.com
[6] khalil-shreateh.com
[5] bleepingcomputer.com
[5] nationalcybersecurity.com
[4] youtube.com
[4] dr-farfar.com

Top Domains in Tweet in G7:
[48] twitter.com
[29] github.com
[23] s.id
[6] bugbountyguide.org
[4] bugcrowd.com
[3] paper.li
[3] nakanosec.com
[3] hacknopedia.com
[3] hackerone.com
[3] hacklido.com

Top Domains in Tweet in G8:
[81] github.com
[53] comparitech.com
[28] twitter.com
[10] securityzines.com
[9] foxutech.com
[9] wlanprofessionals.com
[5] pinterest.com
[5] hacklido.com
[4] networkwalks.com
[4] thecrazyprogrammer.com

Top Domains in Tweet in G9:
[12] github.com
[9] twitter.com
[8] youtube.com
[7] hackers-arise.com
[5] professormesser.com
[3] comparitech.com
[2] securityzines.com
[2] github.io
[1] limitedresults.com
[1] cnn.com

Top Domains in Tweet in G10:
[32] twitter.com
[30] programmatic.solutions
[16] github.com
[3] udemy.com
[1] hacklido.com
[1] comparitech.com
[1] paper.li
[1] hakin9.org
[1] http418infosec.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[4932] infosec
[3681] cybersecurity
[1403] pentesting
[1225] hacking
[1152] oscp
[889] informationsecurity
[871] redteam
[757] cybersecuritytips
[601] cissp
[440] phishing



Top Hashtags in Tweet in G1:
[1850] infosec
[1685] cybersecurity
[481] hacking
[424] phishing
[356] pentesting
[273] oscp
[241] security
[238] privacy
[218] hacker
[205] informationsecurity

Top Hashtags in Tweet in G2:
[377] infosec
[198] cybersecurity
[146] pentesting
[138] redteam
[91] pentest
[68] hacking
[67] oscp
[59] cybersecuritytips
[50] informationsecurity
[35] cissp

Top Hashtags in Tweet in G3:
[367] infosec
[6] cybersecurity
[2] thread
[2] litlikebic
[1] bugbounty
[1] thesecureedge
[1] merrychristmas
[1] unitedstates
[1] pentest
[1] redteam

Top Hashtags in Tweet in G4:
[407] infosec
[379] cybersecurity
[367] cybersecuritytips
[333] pentesting
[308] oscp
[300] redteam
[256] informationsecurity
[224] cissp
[12] cyber
[10] threathunting

Top Hashtags in Tweet in G5:
[372] infosec
[343] cybersecurity
[318] hacking
[27] pentesting
[21] oscp
[13] informationsecurity
[12] cybersecuritytips
[12] redteam
[9] cissp
[4] cybersec

Top Hashtags in Tweet in G6:
[138] infosec
[94] cybersecurity
[42] pentesting
[40] hacking
[30] malware
[25] redteam
[25] bugbounty
[23] evasion
[20] technology
[19] security

Top Hashtags in Tweet in G7:
[155] infosec
[88] cybersecurity
[49] bugbounty
[48] hacking
[34] pentesting
[22] oscp
[21] cybersecuritytips
[20] bugbountytips
[19] informationsecurity
[18] redteam

Top Hashtags in Tweet in G8:
[430] infosec
[397] cybersecurity
[371] pentesting
[358] oscp
[280] informationsecurity
[168] hacking
[158] cissp
[123] redteam
[51] cybersec
[50] datasecurity

Top Hashtags in Tweet in G9:
[176] infosec
[141] cybersecurity
[92] python
[92] python4hackers
[19] hacking
[15] osint
[15] pentesting
[14] cyberwarrior
[10] oscp
[8] threathunting

Top Hashtags in Tweet in G10:
[111] infosec
[42] rustlang
[42] rust
[42] malware
[39] cybersecurity
[26] pentesting
[24] oscp
[24] redteam
[22] informationsecurity
[16] cybersecuritytips

Top Words
Top Words in Tweet in Entire Graph:
[4932] #infosec
[3681] #cybersecurity
[1403] #pentesting
[1225] #hacking
[1152] #oscp
[973] security
[889] #informationsecurity
[871] #redteam
[757] #cybersecuritytips
[741] cybersecurity

Top Words in Tweet in G1:
[1850] #infosec
[1685] #cybersecurity
[481] #hacking
[424] #phishing
[381] security
[356] #pentesting
[291] detected
[277] address
[273] #oscp
[267] clone

Top Words in Tweet in G2:
[377] #infosec
[327] part
[227] 0xor0ne
[205] exploitation
[198] #cybersecurity
[181] series
[146] #pentesting
[139] reverse
[138] engineering
[138] #redteam

Top Words in Tweet in G3:
[367] #infosec
[362] hetmehtaa
[357] 2022
[353] 12
[353] cybersecurity
[353] thread
[353] trainings
[353] free
[6] #cybersecurity
[4] thanks

Top Words in Tweet in G4:
[407] #infosec
[379] #cybersecurity
[367] #cybersecuritytips
[333] #pentesting
[327] hackinarticles
[308] #oscp
[300] #redteam
[256] #informationsecurity
[224] #cissp
[199] day

Top Words in Tweet in G5:
[372] #infosec
[343] #cybersecurity
[318] #hacking
[303] nandanlohitaksh
[303] security
[228] api
[226] checklist
[72] awesome
[68] web3
[31] file

Top Words in Tweet in G6:
[138] #infosec
[94] #cybersecurity
[51] infosec
[42] #pentesting
[40] #hacking
[32] security
[30] #malware
[29] lastpass
[28] account
[25] #redteam

Top Words in Tweet in G7:
[155] #infosec
[148] gt
[144] lt
[120] zip
[120] php
[102] src
[102] 26tab
[100] taksec
[93] favorite
[88] #cybersecurity

Top Words in Tweet in G8:
[430] #infosec
[397] #cybersecurity
[371] #pentesting
[358] #oscp
[295] shubham_pen
[280] #informationsecurity
[192] credit
[168] #hacking
[158] #cissp
[148] cheat

Top Words in Tweet in G9:
[186] python
[176] #infosec
[141] #cybersecurity
[121] three_cube
[105] part
[102] hackers
[97] getting
[97] basics
[97] started
[92] #python

Top Words in Tweet in G10:
[111] #infosec
[67] ox4d5a
[54] linux
[48] hacking
[45] kali
[42] tomorrow
[42] #rustlang
[42] manager
[42] hide
[42] #rust

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[1886] #infosec,#cybersecurity
[1120] #pentesting,#oscp
[1072] #cybersecurity,#infosec
[742] #cybersecurity,#cybersecuritytips
[668] #cybersecuritytips,#pentesting
[532] #oscp,#redteam
[500] #cybersecurity,#pentesting
[451] 2022,#infosec
[449] #infosec,thread
[449] cybersecurity,trainings

Top Word Pairs in Tweet in G1:
[685] #infosec,#cybersecurity
[441] #cybersecurity,#infosec
[287] #hacking,#cybersecurity
[270] #pentesting,#oscp
[254] clone,address
[254] #phishing,clone
[254] detected,#phishing
[196] #cybersecurity,#cybersecuritytips
[188] #cybersecuritytips,#pentesting
[161] #infosec,#comptia

Top Word Pairs in Tweet in G2:
[138] reverse,engineering
[127] engineering,exploitation
[124] part,part
[112] inversecos,part
[112] series,arm64
[112] arm64,ios
[112] exploitation,inversecos
[112] ios,reverse
[111] 0xor0ne,series
[99] #infosec,#cybersecurity

Top Word Pairs in Tweet in G3:
[353] cybersecurity,trainings
[353] 2022,#infosec
[353] #infosec,thread
[353] 12,cybersecurity
[353] trainings,2022
[353] free,12
[352] hetmehtaa,free
[6] #cybersecurity,#infosec
[4] daily,thanks
[3] impressive,contents

Top Word Pairs in Tweet in G4:
[376] #infosec,#cybersecurity
[367] #cybersecurity,#cybersecuritytips
[325] #cybersecuritytips,#pentesting
[308] #pentesting,#oscp
[290] #oscp,#redteam
[250] #redteam,#informationsecurity
[219] #informationsecurity,#cissp
[199] day,#infosec
[199] pic,day
[184] #cissp,#c

Top Word Pairs in Tweet in G5:
[313] #cybersecurity,#infosec
[309] #infosec,#hacking
[226] security,checklist
[226] api,security
[226] checklist,#cybersecurity
[225] nandanlohitaksh,api
[72] security,#cybersecurity
[70] nandanlohitaksh,awesome
[68] awesome,web3
[68] web3,security

Top Word Pairs in Tweet in G6:
[31] #cybersecurity,#infosec
[26] #hacking,#cybersecurity
[23] #cybersecurity,#evasion
[23] #redteam,#pentesting
[23] #evasion,#malware
[23] #pentesting,#hacking
[23] #infosec,#redteam
[23] #malware,#bugbounty
[22] delete,account
[21] lastpass,setting

Top Word Pairs in Tweet in G7:
[88] taksec,favorite
[60] file,zip
[60] zip,interesting
[60] upload,zip
[60] application,allow
[60] web,application
[60] ext,php
[60] zip,file
[60] php,wrapper
[60] allow,upload

Top Word Pairs in Tweet in G8:
[374] #infosec,#cybersecurity
[358] #pentesting,#oscp
[324] #cybersecurity,#pentesting
[257] #oscp,#informationsecurity
[148] cheat,sheet
[148] credit,#infosec
[145] #informationsecurity,#hacking
[138] #hacking,#cissp
[109] sheet,credit
[92] shubham_pen,best

Top Word Pairs in Tweet in G9:
[121] #infosec,#cybersecurity
[97] part,getting
[97] getting,started
[96] hackers,part
[96] basics,hackers
[92] python,basics
[92] #python,#python4hackers
[92] #python4hackers,#infosec
[92] python,#python
[92] started,python

Top Word Pairs in Tweet in G10:
[45] kali,linux
[42] #infosec,#rustlang
[42] tomorrow,#infosec
[42] process,task
[42] hide,process
[42] task,manager
[42] tutorial,tomorrow
[42] #rust,#malware
[42] manager,tutorial
[42] #rustlang,#rust

Top Replied-To
Top Replied-To in Entire Graph:
@infosec_taylor
@infosec_fox
@tracketpacer
@bettersafetynet
@hetmehtaa
@nerdpyle
@atluxity
@olmaverick
@infosec_j
@zarchasmpgmr

Top Replied-To in G1:
@infosec_fox
@olmaverick
@raellelogan1
@fat_jacques
@gartner_inc
@davepperlmutter
@ch875299_craig
@hetmehtaa
@myther
@dev_trace

Top Replied-To in G3:
@hetmehtaa

Top Replied-To in G4:
@hackinarticles

Top Replied-To in G6:
@bsiindia

Top Replied-To in G7:
@taksec

Top Replied-To in G8:
@shubham_pen

Top Replied-To in G9:
@kromsec

Top Replied-To in G10:
@troyhunt

Top Mentioned
Top Mentioned in Entire Graph:
@hackinarticles
@hetmehtaa
@shubham_pen
@nandanlohitaksh
@0xor0ne
@ptracesecurity
@three_cube
@cyberwarship
@aacle_
@taksec

Top Mentioned in G1:
@hackinarticles
@ncsventurescorp
@hackwithenry
@atomspam
@shubham_pen
@reach2ratan
@grid32infosec
@jinibabd
@corix_jc
@willringzz

Top Mentioned in G2:
@0xor0ne
@inversecos
@ptracesecurity
@cyberwarship
@hackinarticles
@matheusgar
@_lkmidas
@limitedresults
@shubham_pen
@nandanlohitaksh

Top Mentioned in G3:
@hetmehtaa
@1davidclarke
@ghostpwsh
@savetonotion
@bowiestate
@infosec_jobscom
@cyberwarship
@ptracesecurity
@secassured
@fanatelevision

Top Mentioned in G4:
@hackinarticles
@hetmehtaa
@blueteamsec1
@shubham_pen
@cyberwarship
@subhashpaudel94
@nikkisiapno
@ptracesecurity
@thehackersnews
@eforensics_mag

Top Mentioned in G5:
@nandanlohitaksh
@hetmehtaa
@shubham_pen
@hackinarticles
@kiranparmar1255
@ptracesecurity
@cyberwarship
@todaycybernews
@jinibabd
@brutelogic

Top Mentioned in G6:
@superciso
@harsh___hack
@gerald_auger
@gocleared
@vsheher
@molislaegers
@securityb0at
@elliessurviving
@penllawen
@adam__cyber

Top Mentioned in G7:
@taksec
@aacle_
@hackinarticles
@hacker0x01
@thebinarybot
@nandanlohitaksh
@shubham_pen
@bugcrowd
@3nc0d3dguy
@dailydarkweb

Top Mentioned in G8:
@shubham_pen
@hackinarticles
@stationx
@sansforensics
@hetmehtaa
@nandanlohitaksh
@cyberwarship
@forrestbrazeal
@ptracesecurity
@nmap

Top Mentioned in G9:
@three_cube
@hetmehtaa
@nandanlohitaksh
@hackinarticles
@securityonion
@davidbombal
@shubham_pen
@adanielhill
@ptracesecurity
@liontarakos

Top Mentioned in G10:
@ox4d5a
@rez0__
@hackinarticles
@shubham_pen
@aacle_
@nandanlohitaksh
@hetmehtaa
@cyberwarship
@jc_vazquez
@programmatoris

Top Tweeters
Top Tweeters in Entire Graph:
@threadreaderapp
@sectest9
@chidambara09
@cybersecurityn8
@applesupport
@_redfrog
@malliardreport
@sudeepkhatri
@davepperlmutter
@dataaugmented

Top Tweeters in G1:
@sectest9
@cybersecurityn8
@_redfrog
@sudeepkhatri
@davepperlmutter
@periscopeislit
@pelopez1
@savetonotion
@calcaware
@netsecu

Top Tweeters in G2:
@youranonriots
@ottlegalrebels
@free_media_hub
@radiofreetom
@ossmeteobargone
@digitaldecoded1
@tabithastevens8
@niranam_salt
@poetyca
@take_gattcha

Top Tweeters in G3:
@omi_082
@shaqblac
@rodrigo99691785
@gittarhh
@memdotai
@tenhush
@poleai
@mrgerry
@sulubabs
@chidinmaobasi9

Top Tweeters in G4:
@tigray_t21
@parvez1
@awtach
@carrionsoul
@sesuter1
@cezmx
@unixdoss
@gersariel1
@chetan_naik
@alfreddelarosa

Top Tweeters in G5:
@kisuru
@austin_castel
@k_cybersecwrld
@charlyaztec
@thisisbolaji
@sirmicpet
@bartolin2067
@emekamomodu
@good_sector
@abdulgaffar____

Top Tweeters in G6:
@johnnyciocca
@m157q_news_rss
@hntweets
@rdsweb
@qedx_
@_drfrusci
@hn_frontpage
@winsontang
@viss
@chipgoines

Top Tweeters in G7:
@bbcworld
@dariosailor86
@treadstone71llc
@bamitav
@tazwake
@heyjude_310
@fragmentedsoul5
@itumeleng_les
@m3sm4r
@verdoux11

Top Tweeters in G8:
@anil7kishan
@parkerrm39
@sandmaxprime
@luengo1958
@davidpo70185185
@et_elias_et
@alex_ramirez69
@aespejo9
@theunicornxxl
@abdullahalzakry

Top Tweeters in G9:
@fullnam35087976
@adam_it_
@_hvfizul
@darkwebtoday
@mohiru_kamau
@three_cube
@adanielhill
@king6_roger
@i_maghvendra
@codailychalleng

Top Tweeters in G10:
@ricardo_ik_ahau
@mlgfadel
@jc_vazquez
@troyhunt
@sinhuebaez
@jrotermund
@icristerna2
@cyberthompson
@fbettag
@shockupsober


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.