InSpy
InSpy is a LinkedIn enumeration tool for discovering employees by job titles and technologies used by target companies. It requires a HunterIO API key for operation.
Description
InSpy performs enumeration on LinkedIn to identify employees and technologies associated with specific companies. It supports searching for employees matching provided job titles or departments from wordlist files, as well as identifying technologies in use at target organizations using predefined term lists. The tool outputs results in multiple formats including HTML, CSV, JSON, and XML for further analysis.
Primary use cases include reconnaissance during penetration testing, OSINT gathering for corporate targeting, and mapping organizational structures via public LinkedIn data. Users provide company names, domains, email formats, and wordlists to tailor searches. Accepted email formats enable generation of potential employee email addresses based on discovered profiles.
The tool is Python-based and integrates with external APIs, necessitating setup of a HunterIO key. It is particularly useful for security assessments where understanding personnel and tech stacks provides context for social engineering or targeted attacks.
How It Works
InSpy queries LinkedIn using provided company names, domains, and wordlists of job titles or technology terms. It leverages the HunterIO API for email discovery and validation. The tool parses LinkedIn search results to match employees by title/department or technologies by company usage, generating formatted outputs from scraped profile data. Email addresses are constructed using specified patterns from discovered names.
Installation
sudo apt install inspyFlags
Examples
inspy --empspy /usr/share/inspy/wordlists/title-list-large.txt googleinspy --techspy /usr/share/inspy/wordlists/tech-list-small.txt ciscoinspy --titles /usr/share/inspy/wordlists/title-list-large.txt examplecorpinspy --domain example.com --email {first}.{last}@{domain} targetcompanyinspy --html results.html targetcompanyinspy --csv results.csv --titles titles.txt targetcompanyinspy --json results.json targetcompany