Information Gatheringlinkedinenumerationemployeestechnologiesosintrecon

InSpy

InSpy is a LinkedIn enumeration tool for discovering employees by job titles and technologies used by target companies. It requires a HunterIO API key for operation.

Description

InSpy performs enumeration on LinkedIn to identify employees and technologies associated with specific companies. It supports searching for employees matching provided job titles or departments from wordlist files, as well as identifying technologies in use at target organizations using predefined term lists. The tool outputs results in multiple formats including HTML, CSV, JSON, and XML for further analysis.

Primary use cases include reconnaissance during penetration testing, OSINT gathering for corporate targeting, and mapping organizational structures via public LinkedIn data. Users provide company names, domains, email formats, and wordlists to tailor searches. Accepted email formats enable generation of potential employee email addresses based on discovered profiles.

The tool is Python-based and integrates with external APIs, necessitating setup of a HunterIO key. It is particularly useful for security assessments where understanding personnel and tech stacks provides context for social engineering or targeted attacks.

How It Works

InSpy queries LinkedIn using provided company names, domains, and wordlists of job titles or technology terms. It leverages the HunterIO API for email discovery and validation. The tool parses LinkedIn search results to match employees by title/department or technologies by company usage, generating formatted outputs from scraped profile data. Email addresses are constructed using specified patterns from discovered names.

Installation

bash
sudo apt install inspy

Flags

--domain DOMAINCompany domain to use for searching.
--email EMAILEmail format to create email addresses with. Accepted Formats: {first}.{last}@{domain}, {f}{last}@{domain}, {f}.{last}@{domain}, {first}_{last}@{domain}, {first}@{domain}, {last}@{domain}, {first}{l}@{domain}, {f}@{domain}.
--titles [file]Discover employees by title and/or department. Titles and departments are imported from a new line delimited file.
--html filePrint results in HTML file.
--csv filePrint results in CSV format.
--json filePrint results in JSON.
--xml filePrint results in XML.

Examples

Search LinkedIn for google employees (–empspy) with the provided wordlist of job titles (/usr/share/inspy/wordlists/title-list-large.txt).
inspy --empspy /usr/share/inspy/wordlists/title-list-large.txt google
Search for technologies (–techspy) in use at the target company (cisco) using the provided list of terms (/usr/share/inspy/wordlists/tech-list-small.txt).
inspy --techspy /usr/share/inspy/wordlists/tech-list-small.txt cisco
Discover employees by title and/or department at examplecorp using titles from the specified file.
inspy --titles /usr/share/inspy/wordlists/title-list-large.txt examplecorp
Enumerate targetcompany using domain example.com and generate emails in {first}.{last}@{domain} format.
inspy --domain example.com --email {first}.{last}@{domain} targetcompany
Run enumeration on targetcompany and output results to HTML file results.html.
inspy --html results.html targetcompany
Enumerate employees by titles from titles.txt at targetcompany and save CSV output to results.csv.
inspy --csv results.csv --titles titles.txt targetcompany
Perform default enumeration on targetcompany and output results in JSON format to results.json.
inspy --json results.json targetcompany
Updated 2026-04-16kali.org ↗