All Projects → initstring → Linkedin2username

initstring / Linkedin2username

Licence: mit
OSINT Tool: Generate username lists for companies on LinkedIn

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Linkedin2username

Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-15.28%)
Mutual labels:  osint, hacking, pentesting, penetration-testing
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-79.17%)
Mutual labels:  osint, hacking, pentesting, penetration-testing
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-5.95%)
Mutual labels:  hacking, pentesting, penetration-testing
Vault
swiss army knife for hackers
Stars: ✭ 346 (-31.35%)
Mutual labels:  osint, hacking, pentesting
Goohak
Automatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (-14.29%)
Mutual labels:  osint, hacking, pentesting
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+598.61%)
Mutual labels:  hacking, pentesting, penetration-testing
Osintgram
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (-38.1%)
Mutual labels:  osint, hacking, penetration-testing
Osint tips
OSINT
Stars: ✭ 322 (-36.11%)
Mutual labels:  osint, hacking, pentesting
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-24.21%)
Mutual labels:  hacking, pentesting, penetration-testing
Nmap
Idiomatic nmap library for go developers
Stars: ✭ 391 (-22.42%)
Mutual labels:  hacking, pentesting, penetration-testing
Pentestkit
Useful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (-8.13%)
Mutual labels:  hacking, pentesting, penetration-testing
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+595.04%)
Mutual labels:  hacking, pentesting, penetration-testing
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+572.82%)
Mutual labels:  osint, hacking, penetration-testing
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-46.63%)
Mutual labels:  osint, hacking, pentesting
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+582.34%)
Mutual labels:  osint, penetration-testing, pentesting
Mosint
An automated e-mail OSINT tool
Stars: ✭ 184 (-63.49%)
Mutual labels:  osint, hacking, pentesting
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-20.04%)
Mutual labels:  osint, pentesting, penetration-testing
Burpsuite Xkeys
A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-71.43%)
Mutual labels:  osint, hacking, pentesting
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+358.73%)
Mutual labels:  osint, hacking, pentesting
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+725.79%)
Mutual labels:  hacking, pentesting, penetration-testing

linkedin2username

OSINT Tool: Generate username lists from companies on LinkedIn.

This is a pure web-scraper, no API key required. You use your valid LinkedIn username and password to login, it will create several lists of possible username formats for all employees of a company you point it at.

Use an account with a lot of connections, otherwise you'll get crappy results. Adding a couple connections at the target company should help - this tool will work up to third degree connections. Note that LinkedIn will cap search results to 1000 employees max. You can use the features '--geoblast' or '--keywords' to bypass this limit. Look at help below for more details.

WARNING: LinkedIn has recently (Sept 2020) been hitting li2u users with the monthly commercial search limit. It's a bit mysterious as to when/why this happens. When you hit the limit, you won't be able to search again until the 1st of the month. If you know of a workaround, please let me know.

Here's what you get:

  • first.last.txt: Usernames like Joe.Schmoe
  • f.last.txt: Usernames like J.Schmoe
  • flast.txt: Usernames like JSchmoe
  • firstl.txt: Usernames like JoeS
  • first.txt Usernames like Joe
  • lastf.txt Usernames like SchmoeJ
  • rawnames.txt: Full name like Joe Schmoe

Optionally, the tool will append @domain.xxx to the usernames.

Example

You'll need to provide the tool with LinkedIn's company name. You can find that by looking at the URL for the company's page. It should look something like https://linkedin.com/company/uber-com. It may or may not be as simple as the exact name of the company.

Here's an example to pull all employees of Uber:

$ python linkedin2username.py [email protected] uber-com

Here's an example to pull a shorter list and append the domain name @uber.com to them:

$ python linkedin2username.py [email protected] uber-com -d 5 -n 'uber.com'

Full Help

usage: linkedin2username.py [-h] [-p PASSWORD] [-n DOMAIN] [-d DEPTH]
                            [-s SLEEP]
                            username company

positional arguments:
  username              A valid LinkedIn username.
  company               Company name.

optional arguments:
  -h, --help            show this help message and exit
  -p PASSWORD, --password PASSWORD
                        Specify your password on in clear-text on the command
                        line. If not specified, will prompt and not display on
                        screen.
  -n DOMAIN, --domain DOMAIN
                        Append a domain name to username output. [example: '-n
                        uber.com' would ouput [email protected]]
  -d DEPTH, --depth DEPTH
                        Search depth. If unset, will try to grab them all.
  -s SLEEP, --sleep SLEEP
                        Seconds to sleep between pages. defaults to 3.
  -x PROXY, --proxy PROXY
                        HTTPS proxy server to use. Example: "-p
                        https://localhost:8080" WARNING: WILL DISABLE SSL
                        VERIFICATION.

  -k KEYWORDS, --keywords KEYWORDS
                        Filter results by a a list of command separated
                        keywords. Will do a separate loop for each keyword,
                        potentially bypassing the 1,000 record limit.
                        [example: "-k 'sales,human resources,information
                        technology']
  -g, --geoblast        Attempts to bypass the 1,000 record search limit by
                        running multiple searches split across geographic
                        regions.

Toubleshooting

Sometimes LinkedIn does weird stuff or returns weird results. Sometimes it doesn't like you logging in from new locations. If something looks off, run the tool once or twice more. If it still isn't working, please open an issue.

This is a security research tool. Use only where granted explicit permission from the network owner.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].