linkedin2username
OSINT tool that generates username lists from companies on LinkedIn. Pure web-scraper requiring valid LinkedIn credentials, no API key needed.
Description
linkedin2username is designed to create lists of possible username formats for all employees of a specified company by scraping LinkedIn. Users provide their valid LinkedIn username and password to log in, enabling the tool to access and extract employee data from the company's LinkedIn page.
Use cases include reconnaissance for penetration testing, username enumeration for password spraying attacks, and gathering intelligence on target organizations. It supports customization like appending domains to usernames and controlling search depth.
The tool may break if LinkedIn updates their site structure; issues should be reported on GitHub for quick fixes. It relies on web scraping techniques rather than official APIs.
How It Works
The tool uses Selenium with Chromium driver to automate browser interactions, logging into LinkedIn with provided credentials. It scrapes the target company's LinkedIn page, iterating through employee lists in loops of 50 based on specified depth, generating probable username formats from extracted data. Proxy support and sleep intervals help evade detection.
Installation
sudo apt install linkedin2usernameFlags
Examples
linkedin2username -hlinkedin2username -c Uberlinkedin2username -c Uber -n uber.comlinkedin2username -c Uber -d 5linkedin2username -c Uber -s 10linkedin2username -c Uber -x http://proxy:8080linkedin2username -c Uber -o usernames.txt