LinkedIn Recon Tool
No Data
Contributors:
git clone https://github.com/vysecurity/LinkedInt cd LinkedInt pip install -r requirements.txt
[v1.1 27-03-2021]
Fixes: * Fixed the authentication flow * Fixed hunter API demo key - removed
Additions: * Added better looking missing image value for the profiles with no photo. * Embedded all images into the HTML file to allow for offline viewing. * Added credits
[v0.1 BETA 12-07-2017]
Additions: * UI Updates * Constrain to company filters * Addition of Hunter for e-mail prediction
Using General Motors as the target as they have a bug bounty program.
██╗ ██╗███╗ ██╗██╗ ██╗███████╗██████╗ ██╗███╗ ██╗████████╗ ██║ ██║████╗ ██║██║ ██╔╝██╔════╝██╔══██╗██║████╗ ██║╚══██╔══╝ ██║ ██║██╔██╗ ██║█████╔╝ █████╗ ██║ ██║██║██╔██╗ ██║ ██║ ██║ ██║██║╚██╗██║██╔═██╗ ██╔══╝ ██║ ██║██║██║╚██╗██║ ██║ ███████╗██║██║ ╚████║██║ ██╗███████╗██████╔╝██║██║ ╚████║ ██║ ╚══════╝╚═╝╚═╝ ╚═══╝╚═╝ ╚═╝╚══════╝╚═════╝ ╚═╝╚═╝ ╚═══╝ ╚═╝Providing you with Linkedin Intelligence Author: Vincent Yiu (@vysec, @vysecurity) Original version by @DisK0nn3cT [*] Enter search Keywords (use quotes for more precise results) "General Motors"
[*] Enter filename for output (exclude file extension) generalmotors
[*] Filter by Company? (Y/N): Y
[*] Specify a Company ID (Provide ID or leave blank to automate):
[*] Enter e-mail domain suffix (eg. contoso.com): gm.com
[*] Select a prefix for e-mail generation (auto,full,firstlast,firstmlast,flast,first.last,fmlast): auto
[*] Automatically using Hunter IO to determine best Prefix [!] {first}.{last} [+] Found first.last prefix
Output (HTML):