infosec, Twitter, 1/9/2023 10:47:02 PM, 287573


FAQ | Problem?

infosec_2023-01-09_12-15-01.xlsx
infosec_2023-01-09_12-15-01.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
January 09, 2023
Short Description:
infosec via NodeXL https://bit.ly/3Gm9jo0
@sectest9
@hackinarticles
@shubham_pen
@cybersecurityn8
@cyberdfir
@0x0sojalsec
@hetmehtaa
@3nc0d3dguy
@beefyspace
@securitytrybe

Top hashtags:
#infosec
#cybersecurity
#pentesting
#oscp
#informationsecurity
#hacking
#redteam

Description:
Description
The graph represents a network of 2,881 Twitter users whose recent tweets contained "infosec", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 1/8/2023 5:00:34 PM. The network was obtained from Twitter on Monday, 09 January 2023 at 20:19 UTC.

The tweets in the network were tweeted over the 1639-day, 3-hour, 29-minute period from Saturday, 14 July 2018 at 21:31 UTC to Monday, 09 January 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 2881
Unique Edges : 1323
Edges With Duplicates : 9101
Total Edges : 10424
Number of Edge Types : 8
Retweet : 3818
MentionsInRetweet : 4390
Mentions : 642
Tweet : 1187
Replies to : 95
MentionsInReplyTo : 197
Quote : 22
MentionsInQuote : 73
Self-Loops : 1400
Reciprocated Vertex Pair Ratio : 0.00755176613885505
Reciprocated Edge Ratio : 0.0149903288201161
Connected Components : 277
Single-Vertex Connected Components : 134
Maximum Vertices in a Connected Component : 2224
Maximum Edges in a Connected Component : 9579
Maximum Geodesic Distance (Diameter) : 12
Average Geodesic Distance : 3.964477
Graph Density : 0.000498476609202052
Modularity : 0.334438
NodeXL Version : 1.0.1.508
Data Import : The graph represents a network of 2,881 Twitter users whose recent tweets contained "infosec", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 1/8/2023 5:00:34 PM. The network was obtained from Twitter on Monday, 09 January 2023 at 20:19 UTC.

The tweets in the network were tweeted over the 1639-day, 3-hour, 29-minute period from Saturday, 14 July 2018 at 21:31 UTC to Monday, 09 January 2023 at 01:00 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : TwitterSearch2
Graph Term : infosec
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[177] https://start.me/p/DPYPMz/the-ultimate-osint-collection
[168] https://twitter.com/hetmehtaa/status/1611909916767453185/photo/1
[80] https://www.comparitech.com/net-admin/nmap-nessus-cheat-sheet/
[63] https://atomspam.com/
[45] https://www.fosstechnix.com/docker-command-cheat-sheet/
[39] https://docs.google.com/spreadsheets/d/1F9wUdEJv22HdqhSn6hy-QVtS7eumgZWYYrD-OSi6JOc/edit#gid=2080645025
[37] https://www.hackingarticles.in/a-little-guide-to-smb-enumeration/
[34] https://twinybots.ch/
[32] http://cyberiqs.com/latestnews
[29] https://twitter.com/0x0SojalSec/status/1611793854247899138/photo/1

Top URLs in Tweet in G1:
[63] https://atomspam.com/
[32] http://cyberiqs.com/latestnews
[22] https://phishstats.info/
[14] https://www.csoonline.com/article/3675542/8-strange-ways-employees-can-accidently-expose-data.html
[8] https://www.scoop.it/topic/cybersecurity-leadership/p/4139688678/2023/01/08/cyber-threats-driving-insurance-claims-activity?utm_medium=social&utm_source=twitter
[8] https://www.helpnetsecurity.com/2022/10/04/mandatory-password-expiration-helping-or-hurting-password-security/
[7] https://gizmodo.com/hacks-telecoms-at-t-t-mobile-1849959522
[7] https://www.cpomagazine.com/cyber-security/seven-steps-to-cyber-risk-mitigation/?utm_source=twitter&utm_medium=social&utm_campaign=novashare
[7] https://www.amazon.com/Kill-Chain-This-Digital-Dark-ebook/dp/B09YS4D1H5/?geniuslink=true
[7] https://www.dbdigest.com/2023/01/ransomware-operator-claims-week-1-2023.html

Top URLs in Tweet in G2:
[22] https://twitter.com/0x0SojalSec/status/1611793854247899138/photo/1
[11] https://twitter.com/0x0SojalSec/status/1611795455717044229/photo/1
[9] https://twitter.com/0x0SojalSec/status/1611786479151517697/photo/1
[8] https://twitter.com/0x0SojalSec/status/1611784182786850816/photo/1
[8] https://twitter.com/0x0SojalSec/status/1611785385184751616/photo/1
[8] https://start.me/p/DPYPMz/the-ultimate-osint-collection
[8] https://twitter.com/hetmehtaa/status/1611909916767453185/photo/1
[5] https://findhunters.com
[5] https://twitter.com/0x0SojalSec/status/1611788191107010560/photo/1
[4] https://hacklido.com/blog/210

Top URLs in Tweet in G3:
[21] https://docs.google.com/spreadsheets/d/1F9wUdEJv22HdqhSn6hy-QVtS7eumgZWYYrD-OSi6JOc/edit#gid=2080645025
[17] https://www.hackingarticles.in/a-little-guide-to-smb-enumeration/
[13] https://www.hackingarticles.in/linux-privilege-escalation-automated-script/
[5] https://www.hackingarticles.in/window-privilege-escalation-automated-script/
[4] https://xmind.app/m/vQuTSG/#
[4] https://www.hackingarticles.in/burp-suite-for-pentester-fuzzing-with-intruder-part-1/
[4] https://www.hackingarticles.in/burpsuite-for-pentester-fuzzing-with-intruder-part-2/
[4] https://www.hackingarticles.in/burp-suite-for-pentester-fuzzing-with-intruder-part-3/
[3] https://twitter.com/hackinarticles/status/1612093961409298438/photo/1
[2] https://forms.gle/p5gYANJNDNbxBiE27

Top URLs in Tweet in G4:
[21] https://github.com/infobyte/cve-2022-27255/blob/main/DEFCON/slides.pdf
[18] https://valsamaras.medium.com/the-toddlers-introduction-to-heap-exploitation-part-1-515b3621e0e8
[11] https://medium.com/@Zard-x/a-detailed-explanation-of-kubernetes-architecture-principles-26abcac29f7c
[9] https://unit42.paloaltonetworks.com/meddler-phishing-attacks/
[7] https://www.sonarsource.com/blog/cacti-unauthenticated-remote-code-execution/?utm_source=twitter&utm_medium=social&utm_campaign=wordpress&utm_content=security&utm_term=mofu
[6] https://github.com/skahwah/SQLRecon
[5] https://hackaday.com/2022/12/06/usb-c-introduction-for-hackers/
[5] https://yaseenzubair.medium.com/web-cache-poisoning-worth-it-e7c6d88797b1
[5] https://twitter.com/ptracesecurity/status/1611663980056961025/photo/1
[5] https://github.com/vitoplantamura/BugChecker

Top URLs in Tweet in G5:
[62] https://www.comparitech.com/net-admin/nmap-nessus-cheat-sheet/
[31] https://www.fosstechnix.com/docker-command-cheat-sheet/
[15] https://blowstack.com/cheat-sheets/
[10] https://networkwalks.com/cloud-computing-notes-cheatsheet/
[6] https://foxutech.com/what-is-dns-and-how-it-works/
[5] https://xmind.app/m/vQuTSG/#
[4] https://twitter.com/Shubham_pen/status/1567101553223376896/photo/1
[4] https://twitter.com/Shubham_pen/status/1610859887650639872/photo/1
[3] https://docs.google.com/spreadsheets/d/1F9wUdEJv22HdqhSn6hy-QVtS7eumgZWYYrD-OSi6JOc/edit#gid=2080645025
[2] https://twitter.com/Shubham_pen/status/1604880488023425030/photo/1

Top URLs in Tweet in G6:
[141] https://start.me/p/DPYPMz/the-ultimate-osint-collection
[141] https://twitter.com/hetmehtaa/status/1611909916767453185/photo/1
[2] https://faun.pub/docker-from-a-beginners-perspective-6e7cc143ce6a
[2] https://www.oracle.com/news/announcement/oracle-offers-free-training-and-certification-for-oracle-cloud-infrastructure-2021-09-08/
[2] https://www.hackingarticles.in/window-privilege-escalation-automated-script/
[1] https://twitter.com/0x0SojalSec/status/1611795455717044229/photo/1
[1] https://www.hackingarticles.in/a-little-guide-to-smb-enumeration/
[1] https://www.hackingarticles.in/linux-privilege-escalation-automated-script/
[1] https://constellix.com/news/nslookup-windows-cheat-sheet
[1] https://rbebooks.site/55-ways-to-have-fun-with-google/

Top URLs in Tweet in G7:
[12] https://twinybots.ch/
[6] https://thehackernews.com/2023/01/russian-turla-hackers-hijack-decade-old.html
[4] https://www.scoop.it/topic/cybersecurity-leadership/p/4139688678/2023/01/08/cyber-threats-driving-insurance-claims-activity?utm_medium=social&utm_source=twitter
[4] https://twitter.com/s3lue_hmm/status/1612133090813526017/photo/1
[4] https://twitter.com/MagusNet/status/1612233341033680896/photo/1
[4] https://twitter.com/iktwiet/status/1612062848200359938/photo/1
[3] https://news24.c1.is/2023/01/08/grand-rounds-vp-infosec-achieving-soc-2-type-ii-compliance-with-hacker-powered-security/
[3] https://twitter.com/HackerTico/status/1612211459613663232/photo/1
[3] https://infosec.exchange/@SwiftOnSecurity/109652046801278746
[2] https://start.me/p/DPYPMz/the-ultimate-osint-collection

Top URLs in Tweet in G8:
[3] https://twitter.com/0x0SojalSec/status/1611795455717044229/photo/1
[3] https://twitter.com/0x0SojalSec/status/1611793854247899138/photo/1
[2] https://twitter.com/TakSec/status/1607797519769292800/photo/1
[2] https://duckduckgo.com/
[2] http://www.bing.com/
[2] http://baidu.com
[2] https://thegrayarea.tech/xss-bypass-for-rich-text-editors-bf5592e555d6
[2] https://start.me/p/DPYPMz/the-ultimate-osint-collection
[2] https://twitter.com/hetmehtaa/status/1611909916767453185/photo/1
[1] https://thegrayarea.tech/mx-takeovers-automated-subdomain-takeover-64e658fc4fb7?_branch_match_id=link-1140466931354426991

Top URLs in Tweet in G9:
[24] https://twitter.com/CyberWarship/status/1611731394874466305/photo/1
[8] https://securitycafe.ro/2022/04/29/pentesting-azure-recon-techniques/
[6] https://twitter.com/CyberWarship/status/1611673261993070592/photo/1
[5] https://redteamsorcery.teachable.com/p/offensive-rust
[4] https://twitter.com/Ox4d5a/status/1612120079168319488/photo/1
[4] https://docs.google.com/spreadsheets/d/1F9wUdEJv22HdqhSn6hy-QVtS7eumgZWYYrD-OSi6JOc/edit#gid=2080645025
[3] https://twitter.com/CyberWarship/status/1611340061345210368/photo/1
[3] https://github.com/post-cyberlabs/Offensive_tools
[3] https://twitter.com/CyberWarship/status/1611306587091509248/photo/1
[3] https://unit42.paloaltonetworks.com/purpleurchin-steals-cloud-resources/

Top URLs in Tweet in G10:
[4] https://www.slashgear.com/1150701/these-phones-will-lose-whatsapp-support-in-2023/
[4] https://www.hackingarticles.in/wordlists-for-pentester/
[4] https://packetstormsecurity.com/crackers/wordlists
[4] https://github.com/six2dez/OneListForAll
[4] https://github.com/danielmiessler/SecLists
[4] https://github.com/D4Vinci/CWFF
[3] https://cyberstartupobservatory.com/cyber-startup-observatory-community/
[3] https://finance.yahoo.com/news/chinese-researchers-claim-cracked-encryption-015930144.html
[3] https://soatok.blog/2022/12/29/what-we-do-in-the-etc-shadow-cryptography-with-passwords/
[2] https://github.com/A-poc/RedTeam-Tools

Top Domains
Top Domains in Tweet in Entire Graph:
[1121] twitter.com
[177] start.me
[142] github.com
[128] paper.li
[110] medium.com
[102] hackingarticles.in
[80] comparitech.com
[63] youtube.com
[63] atomspam.com
[61] nationalcybersecurity.com

Top Domains in Tweet in G1:
[291] twitter.com
[63] atomspam.com
[56] nationalcybersecurity.com
[32] explanations-pro.com
[32] cyberfeed.io
[32] cyberiqs.com
[24] eforensicsmag.com
[22] phishstats.info
[19] medium.com
[17] thehackernews.com

Top Domains in Tweet in G2:
[101] twitter.com
[22] hacklido.com
[11] github.com
[8] start.me
[6] houseofhackers.xyz
[6] hackingarticles.in
[5] findhunters.com
[5] medium.com
[3] faisalahmed.me
[3] fosstechnix.com

Top Domains in Tweet in G3:
[53] twitter.com
[47] hackingarticles.in
[21] google.com
[4] xmind.app
[2] forms.gle
[2] tajdini.net
[2] github.com
[1] sonarsource.com
[1] trustwave.com
[1] hacklido.com

Top Domains in Tweet in G4:
[114] twitter.com
[45] github.com
[41] medium.com
[21] nakanosec.com
[11] paloaltonetworks.com
[7] sonarsource.com
[7] pentestmag.com
[6] github.io
[6] youtube.com
[5] hackaday.com

Top Domains in Tweet in G5:
[62] comparitech.com
[37] twitter.com
[31] fosstechnix.com
[15] blowstack.com
[12] networkwalks.com
[6] foxutech.com
[5] xmind.app
[4] hackingarticles.in
[4] defcon.social
[3] google.com

Top Domains in Tweet in G6:
[142] twitter.com
[141] start.me
[4] hackingarticles.in
[2] faun.pub
[2] oracle.com
[2] rbebooks.site
[1] constellix.com
[1] paloaltonetworks.com
[1] google.com

Top Domains in Tweet in G7:
[55] twitter.com
[19] github.com
[18] paper.li
[12] twinybots.ch
[12] youtube.com
[10] infosec.exchange
[6] thehackernews.com
[6] linkedin.com
[5] theregister.com
[4] scoop.it

Top Domains in Tweet in G8:
[25] twitter.com
[3] thegrayarea.tech
[3] medium.com
[2] duckduckgo.com
[2] bing.com
[2] baidu.com
[2] start.me
[1] dogpile.com
[1] jsfiddle.net
[1] codebeautify.org

Top Domains in Tweet in G9:
[53] twitter.com
[10] github.com
[8] securitycafe.ro
[5] teachable.com
[5] linuxsecurity.expert
[5] hackingarticles.in
[4] paloaltonetworks.com
[4] google.com
[3] reddit.com
[2] trustedsec.com

Top Domains in Tweet in G10:
[25] github.com
[22] twitter.com
[7] hackingarticles.in
[4] slashgear.com
[4] packetstormsecurity.com
[4] medium.com
[4] nationalcybersecurity.com
[3] paper.li
[3] cyberstartupobservatory.com
[3] youtube.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3277] infosec
[2547] cybersecurity
[1118] pentesting
[870] oscp
[758] informationsecurity
[657] hacking
[620] redteam
[616] cybersecuritytips
[539] cissp
[353] privacy



Top Hashtags in Tweet in G1:
[1041] infosec
[991] cybersecurity
[316] privacy
[274] hacking
[274] ransomware
[255] 100daysofcode
[253] cloudsecurity
[250] phishing
[242] datasecurity
[208] pentesting

Top Hashtags in Tweet in G2:
[173] infosec
[80] bugbountytips
[80] cybersec
[72] cybersecurity
[57] bugbounty
[40] cybersecuritytips
[30] pentesting
[24] oscp
[22] rec
[22] hacking

Top Hashtags in Tweet in G3:
[313] cybersecuritytips
[311] infosec
[304] cybersecurity
[283] pentesting
[260] oscp
[243] redteam
[241] informationsecurity
[220] cissp
[33] cybersec
[27] networksecurity

Top Hashtags in Tweet in G4:
[168] infosec
[139] cybersecurity
[113] pentesting
[37] hacking
[32] oscp
[29] cybersecuritytips
[24] informationsecurity
[23] redteam
[16] cissp
[12] kubernetes

Top Hashtags in Tweet in G5:
[263] infosec
[263] cybersecurity
[260] pentesting
[252] oscp
[197] informationsecurity
[107] cissp
[105] hacking
[89] redteam
[37] technology
[28] datasecurity

Top Hashtags in Tweet in G6:
[161] infosec
[142] osint
[142] thesecureedge
[141] forensics
[15] cybersecurity
[9] pentesting
[7] cybersecuritytips
[7] oscp
[6] hacking
[5] redteam

Top Hashtags in Tweet in G7:
[147] infosec
[115] cybersecurity
[41] pentesting
[40] hacking
[30] redteam
[27] security
[25] bugbounty
[24] malware
[19] evasion
[18] cybersec

Top Hashtags in Tweet in G8:
[46] infosec
[24] bugbountytips
[15] cybersecurity
[12] bugbounty
[12] pentesting
[10] hacking
[9] recon
[9] cybersec
[8] oscp
[7] cybersecuritytips

Top Hashtags in Tweet in G9:
[106] infosec
[41] redteam
[32] pentest
[28] pentesting
[27] cybersecurity
[13] cybersecuritytips
[9] oscp
[5] tools
[5] informationsecurity
[4] malware

Top Hashtags in Tweet in G10:
[92] infosec
[80] cybersecurity
[32] pentesting
[27] informationsecurity
[24] oscp
[21] cybersecuritytips
[16] redteam
[14] cissp
[13] linux
[13] privacy

Top Words
Top Words in Tweet in Entire Graph:
[3277] #infosec
[2547] #cybersecurity
[1118] #pentesting
[870] #oscp
[758] #informationsecurity
[657] #hacking
[620] #redteam
[616] #cybersecuritytips
[539] #cissp
[521] security

Top Words in Tweet in G1:
[1041] #infosec
[991] #cybersecurity
[316] #privacy
[274] #hacking
[274] #ransomware
[255] #100daysofcode
[253] #cloudsecurity
[250] #phishing
[242] #datasecurity
[208] #pentesting

Top Words in Tweet in G2:
[248] fuzz
[173] #infosec
[161] 0x0sojalsec
[136] gt
[132] lt
[130] see
[129] hack
[126] explained
[125] api
[125] wrote

Top Words in Tweet in G3:
[313] #cybersecuritytips
[311] #infosec
[304] #cybersecurity
[283] #pentesting
[260] #oscp
[259] hackinarticles
[243] #redteam
[241] #informationsecurity
[220] #cissp
[180] pic

Top Words in Tweet in G4:
[168] #infosec
[139] #cybersecurity
[113] #pentesting
[90] 0xor0ne
[62] ptracesecurity
[59] series
[43] security
[42] reverse
[42] cve
[42] engineering

Top Words in Tweet in G5:
[263] #infosec
[263] #cybersecurity
[260] #pentesting
[252] #oscp
[203] shubham_pen
[197] #informationsecurity
[147] cheat
[147] sheet
[146] credit
[107] #cissp

Top Words in Tweet in G6:
[161] #infosec
[143] osint
[142] hetmehtaa
[142] #osint
[142] #thesecureedge
[141] ultimate
[141] #forensics
[141] clivsti86i
[141] collection
[141] co

Top Words in Tweet in G7:
[147] #infosec
[115] #cybersecurity
[41] #pentesting
[40] #hacking
[39] infosec
[30] #redteam
[27] #security
[25] #bugbounty
[24] #malware
[19] #evasion

Top Words in Tweet in G8:
[125] taksec
[118] email
[117] bug
[114] adamjsturge
[110] subdomain
[110] hunters
[110] emails
[109] impact
[109] high
[109] read

Top Words in Tweet in G9:
[172] offensive
[115] rust
[113] security
[106] #infosec
[68] azure
[60] powershell
[60] response
[60] incident
[59] ox4d5a
[56] game

Top Words in Tweet in G10:
[92] #infosec
[80] #cybersecurity
[32] #pentesting
[27] #informationsecurity
[24] #oscp
[21] #cybersecuritytips
[17] wordlists
[16] #redteam
[14] #cissp
[14] hackinarticles

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[1292] #infosec,#cybersecurity
[867] #pentesting,#oscp
[564] #cybersecurity,#cybersecuritytips
[507] #cybersecuritytips,#pentesting
[464] #cybersecurity,#infosec
[401] #oscp,#redteam
[372] #redteam,#informationsecurity
[371] #cybersecurity,#pentesting
[369] #informationsecurity,#cissp
[342] #oscp,#informationsecurity

Top Word Pairs in Tweet in G1:
[351] #infosec,#cybersecurity
[207] #datasecurity,#privacy
[179] #privacy,#100daysofcode
[163] #pentesting,#oscp
[148] #100daysofcode,#cloudsecurity
[147] #cybersecurity,#infosec
[118] #phishing,#ransomware
[111] #malware,#ransomware
[110] #cybersecurity,#cyberattack
[107] #cybersecurity,#hacker

Top Word Pairs in Tweet in G2:
[124] explained,see
[124] starts,fuzz
[124] api,starts
[124] hack,apis
[124] fuzz,hack
[124] see,api
[124] wrote,another
[124] another,fuzz
[124] apis,explained
[123] 3nc0d3dguy,wrote

Top Word Pairs in Tweet in G3:
[302] #infosec,#cybersecurity
[298] #cybersecurity,#cybersecuritytips
[280] #cybersecuritytips,#pentesting
[260] #pentesting,#oscp
[243] #oscp,#redteam
[240] #redteam,#informationsecurity
[220] #informationsecurity,#cissp
[180] pic,day
[180] day,#infosec
[164] #cissp,#c

Top Word Pairs in Tweet in G4:
[55] #infosec,#cybersecurity
[55] #cybersecurity,#infosec
[42] reverse,engineering
[38] getting,started
[37] started,reverse
[37] text,highlighting
[37] young,getting
[37] nice,series
[37] ghidra,cursor
[37] engineering,ghidra

Top Word Pairs in Tweet in G5:
[258] #infosec,#cybersecurity
[252] #pentesting,#oscp
[233] #cybersecurity,#pentesting
[182] #oscp,#informationsecurity
[147] cheat,sheet
[144] credit,#infosec
[130] sheet,credit
[105] #informationsecurity,#hacking
[95] #hacking,#cissp
[72] #cissp,#redteam

Top Word Pairs in Tweet in G6:
[141] #osint,#thesecureedge
[141] clivsti86i,#infosec
[141] #infosec,#forensics
[141] co,clivsti86i
[141] #forensics,#osint
[141] ultimate,osint
[141] osint,collection
[141] collection,co
[140] hetmehtaa,ultimate
[12] #infosec,#cybersecurity

Top Word Pairs in Tweet in G7:
[36] #cybersecurity,#infosec
[30] #infosec,#cybersecurity
[22] #hacking,#cybersecurity
[21] #infosec,#redteam
[20] #pentesting,#hacking
[19] #malware,#bugbounty
[19] #redteam,#pentesting
[19] #cybersecurity,#evasion
[19] #evasion,#malware
[12] #pentesting,#oscp

Top Word Pairs in Tweet in G8:
[110] bug,hunters
[109] lot,bug
[109] subdomain,takeovers
[109] email,subdomain
[109] high,impact
[109] checking,high
[109] adamjsturge,lot
[109] impact,read
[109] hunters,checking
[109] takeovers,adamjsturge

Top Word Pairs in Tweet in G9:
[112] offensive,security
[60] incident,response
[60] response,powershell
[56] security,course
[56] game,check
[56] level,offensive
[56] rust,launched
[56] security,game
[56] launched,level
[56] rust,offensive

Top Word Pairs in Tweet in G10:
[31] #infosec,#cybersecurity
[24] #pentesting,#oscp
[18] #cybersecurity,#cybersecuritytips
[16] #cybersecuritytips,#pentesting
[14] #cybersecurity,#infosec
[12] #oscp,#redteam
[12] #infosec,#cybersec
[11] #redteam,#informationsecurity
[10] bateman_szn7,nabzsterz
[10] ashleybeenken,fastlanepayne

Top Replied-To
Top Mentioned
Top Mentioned in Entire Graph:
@hackinarticles
@shubham_pen
@0x0sojalsec
@3nc0d3dguy
@hetmehtaa
@taksec
@ptracesecurity
@adamjsturge
@0xor0ne
@securitytrybe

Top Mentioned in G1:
@hackinarticles
@tech
@shubham_pen
@technative
@corix_jc
@joneshacksit
@ingliguori
@bamitav
@ptracesecurity
@atomspam

Top Mentioned in G2:
@0x0sojalsec
@3nc0d3dguy
@hacklido
@0xkayala
@hackinarticles
@taksec
@infoseccomm
@hetmehtaa
@shubham_pen

Top Mentioned in G3:
@hackinarticles
@ptracesecurity
@3nc0d3dguy
@0x0sojalsec
@thebinarybot
@portswigger
@sentinelone
@bastionneinc
@cybernews
@atomspam

Top Mentioned in G4:
@0xor0ne
@ptracesecurity
@hackinarticles
@payloadartist
@ogianatiempo
@ch0pin
@gr33nh4t
@shubham_pen
@securitytrybe

Top Mentioned in G5:
@shubham_pen
@hackinarticles
@ptracesecurity
@bytebytego
@westart_factory
@0x0sojalsec
@payloadartist
@pentestmag
@bobgourley
@0xor0ne

Top Mentioned in G6:
@hetmehtaa
@hackinarticles
@0x0sojalsec
@shubham_pen
@3nc0d3dguy
@ptracesecurity
@0xor0ne
@haneeni61853819
@securitytrybe
@cyph3r_asr

Top Mentioned in G7:
@swiftonsecurity
@smcadman
@gocleared
@squad3301
@infowaropcenter

Top Mentioned in G8:
@taksec
@adamjsturge
@0x0sojalsec
@3nc0d3dguy
@mawg0ud
@hackinarticles
@shubham_pen
@ox4d5a
@0xor0ne

Top Mentioned in G9:
@ox4d5a
@cyberwarship
@ptracesecurity
@hackinarticles
@blueteamsec1
@3nc0d3dguy
@0xor0ne
@shubham_pen
@lselabs
@n1nj4sec

Top Mentioned in G10:
@hackinarticles
@bateman_szn7
@nabzsterz
@datqirlashley
@infosec_ashlie
@ashleybeenken
@fastlanepayne
@nikahverse
@bellahackman
@0x0sojalsec

Top Tweeters
Top Tweeters in Entire Graph:
@amazonhelp
@sectest9
@mistersalesman
@hrblock_21
@sgh_rts
@cybersecurityn8
@blazedrts
@javascriptd
@evankirstel
@rsaliofficial

Top Tweeters in G1:
@sectest9
@sgh_rts
@cybersecurityn8
@blazedrts
@thehill
@rahul05ranjan
@dataaugmented
@periscopeislit
@20m
@foxnews

Top Tweeters in G2:
@apostolwario
@drb0n3z
@christo48746457
@gowthamsadasiva
@dragon199421
@truneski
@davidvalles007
@mythicalcmd
@dstnat
@alecaishere

Top Tweeters in G3:
@1sandy_n_austin
@gersariel1
@gardenersantana
@adam_it_
@tumzvintage
@almaseelesoul
@cyberconsulting
@10xavierquijano
@yxng_danxl
@webprogrpro

Top Tweeters in G4:
@youranonriots
@atsen_
@securityblog
@londonbel0w
@austin_castel
@foscraft
@swiftonsecurity
@definoobcrypto
@realrubberduck1
@offethhacker

Top Tweeters in G5:
@shaniqasmi
@sandmaxprime
@janevoter
@alternative200
@alfreddelarosa
@afmachado
@molacc
@hardikpatel911
@alex_ramirez69
@chinaezurum

Top Tweeters in G6:
@akawombat42
@jspadoan
@sm_telecomm
@geisterkriege
@vinceflibustier
@filipe2747
@edusatoe
@mauricioglucero
@blizzy_shane
@mariais83316772

Top Tweeters in G7:
@anil7kishan
@_drfrusci
@pmprouk
@smcadman
@cybersecboardrm
@infosecsherpa
@sqlinterstellar
@viktorbir
@infination
@josemiguelnovoa

Top Tweeters in G8:
@ayirpelle
@ajem_mx
@take_gattcha
@sitar_strings
@icristerna2
@good_sector
@lhidalgo0204
@andres_riscv
@titan_nine
@meovvare

Top Tweeters in G9:
@poleai
@thebasedpluto
@sforslev
@jcoasugo
@iquechocosa
@pseudonyme_ovb
@m3g9tr0n
@magj2avila
@lselabs
@javier_carriazo

Top Tweeters in G10:
@collectibulldog
@3vil_qu33n
@cyberdfir
@doordash_help
@mundolinuxbot
@7thgypsy
@flxmingoz
@adam_gardner25
@4n1toluv
@comsec


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.