Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mdsecactivebreach/LinkedInt
LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation
https://github.com/mdsecactivebreach/LinkedInt
Last synced: 7 days ago
JSON representation
LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation
- Host: GitHub
- URL: https://github.com/mdsecactivebreach/LinkedInt
- Owner: mdsecactivebreach
- License: gpl-3.0
- Created: 2017-07-12T12:58:47.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2023-05-23T23:34:22.000Z (over 1 year ago)
- Last Synced: 2024-07-25T05:35:37.669Z (3 months ago)
- Language: Python
- Homepage:
- Size: 23.4 KB
- Stars: 469
- Watchers: 25
- Forks: 112
- Open Issues: 14
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-tools - LinkedInt - A LinkedIn scraper for reconnaissance (Asset Discovery / Social Media / Employee Profiling)
- Awesome-Asset-Discovery - LinkedInt
README
# Credits
Original Scraper by Danny Chrastil (@DisK0nn3cT): https://github.com/DisK0nn3cT/linkedin-gatherer
Modified by @vysecurity
# Requirements
```
pip install beautifulsoup4
pip install thready
```# Change Log
[v0.1 BETA 12-07-2017]
Additions:
* UI Updates
* Constrain to company filters
* Addition of Hunter for e-mail prediction# To-Do List
* Allow for horizontal scraping and mass automated company domain, and format prediction per company
* Add Natural Language Processing techniques on titles to discover groups of similar titles to be stuck into same "department". This should then be visualised in a graph.# Usage
Put in LinkedIn credentials in LinkedInt.py
Put Hunter.io API key in LinkedInt.py
Run LinkedInt.py and follow instructions# Example
```
██╗ ██╗███╗ ██╗██╗ ██╗███████╗██████╗ ██╗███╗ ██╗████████╗
██║ ██║████╗ ██║██║ ██╔╝██╔════╝██╔══██╗██║████╗ ██║╚══██╔══╝
██║ ██║██╔██╗ ██║█████╔╝ █████╗ ██║ ██║██║██╔██╗ ██║ ██║
██║ ██║██║╚██╗██║██╔═██╗ ██╔══╝ ██║ ██║██║██║╚██╗██║ ██║
███████╗██║██║ ╚████║██║ ██╗███████╗██████╔╝██║██║ ╚████║ ██║
╚══════╝╚═╝╚═╝ ╚═══╝╚═╝ ╚═╝╚══════╝╚═════╝ ╚═╝╚═╝ ╚═══╝ ╚═╝Providing you with Linkedin Intelligence
Author: Vincent Yiu (@vysec, @vysecurity)
Original version by @DisK0nn3cT
[*] Enter search Keywords (use quotes for more percise results)
"General Motors"[*] Enter filename for output (exclude file extension)
generalmotors[*] Filter by Company? (Y/N):
Y[*] Specify a Company ID (Provide ID or leave blank to automate):
[*] Enter e-mail domain suffix (eg. contoso.com):
gm.com[*] Select a prefix for e-mail generation (auto,full,firstlast,firstmlast,flast,first.last,fmlast):
auto[*] Automaticly using Hunter IO to determine best Prefix
[!] {first}.{last}
[+] Found first.last prefix
```