Information Gathering

ScrapedIn: Enhancing Red Team Operations with Advanced LinkedIn Data Scraping for Target Company Analysis

Tool to scrape LinkedIn

This tool assists in performing reconnaissance using the LinkedIn.com website/API for red team or social engineering engagements. It performs a company specific search to extract a detailed list of employees who work for the target company. Enter the name of the target company and the tool will help determine the LinkedIn company ID, which will be used to perform the search.

NOTE: The tool extracts the maximum results of any search (1,000 contacts) by sendings less than 20 requests.

Output is stored as an XLSX file, however it is intended to be used with Google Spreadsheets and includes a formated report with profile pictures, etc. After importing the XLSX into Google Spreadsheets there will be a “dataset” worksheet and a “report” worksheet.

How to install

sudo apt-get install python3-pip -y
sudo pip install -r requirements.txt

How to run

export LI_USERNAME={username}
export LI_PASSWORD={password}

python3 ScrapedIn.py

Dataset

  • first name
  • last name
  • occupation
  • location
  • industry
  • profile URL
  • picture URL

Report

  • Picture (displayed)
  • Full Name, Occupation
  • Link to Profile
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

7 days ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

7 days ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

1 week ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago