This tool assists in performing reconnaissance using the LinkedIn.com website/API for red team or social engineering engagements. It performs a company specific search to extract a detailed list of employees who work for the target company. Enter the name of the target company and the tool will help determine the LinkedIn company ID, which will be used to perform the search.
NOTE: The tool extracts the maximum results of any search (1,000 contacts) by sendings less than 20 requests.
Output is stored as an XLSX file, however it is intended to be used with Google Spreadsheets and includes a formated report with profile pictures, etc. After importing the XLSX into Google Spreadsheets there will be a “dataset” worksheet and a “report” worksheet.
sudo apt-get install python3-pip -y
sudo pip install -r requirements.txt
export LI_USERNAME={username}
export LI_PASSWORD={password}
python3 ScrapedIn.py
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything…
Avilla Forensics is located in first place in the award international Forensics 4:Cast, in the…
Comprehensive guide to leveraging Google Chrome's extensions for Open-Source Intelligence (OSINT) tasks. In this article,…
Embark on a journey into the realm of digital forensics with our exploration of 'Analisi-Digital-Forense.…
The intersection of intelligence, investigation, and mobility. In this comprehensive guide, we delve into the…
Tookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is…