GoSecure / linkedin-osint

A simple proof of concept that demonstrate how emails can easily be tie to LinkedIn profile
MIT License
39 stars 4 forks source link

LinkedIn Email OSINT

This repository host a small proof-of-concept that deanonymizes emails.

Instructions on how to extract a token required to use the tool can be found here: https://www.gosecure.net/blog/2021/05/27/step-by-step-how-to-deanonymize-emails-on-linkedin/

How to use

The script can be launched this way. The output was masked on purpose for demonstration.

>python outlook_http_client.py samples_demo.txt > profiles_demo.json
 [+] *******@yahoo.com: Not Found
 [!] Nb failures: 1
 [+] *******@gmail.com: Found
 [+] Summary: Paul *******, "Attorney and Counsel" at "*******", "Waltham, Massachusetts, United States"
 [+] *******@hotmail.com: Found
 [+] Summary: David *******, "Engineering Specialist*******" at "*******", "Greater McAllen Area"
 [+] *******@libero.it: Found
 [+] Summary: antonio *******, "******* Professional" at "*******", "Naples, Campania, Italy"
 [+] *******@hotmail.com: Not Found
 [!] Nb failures: 1
 [+] *******@soton.ac.uk: Found
 [+] Summary: Tom *******, "Student *******" at "", "Southampton, England, United Kingdom"
 [+] *******@yahoo.com: Found
 [+] Summary: Madhukar *******, "Financial Crimes*******" at "*******", "New York City Metropolitan Area"
 [+] *******@inmovement.org: Not Found
 [!] Nb failures: 1
 [+] *******@hotmail.com: Found
 [+] Summary: Shaun *******, "Strategic *******" at "*******", "Bismarck, North Dakota, United States"

The stdout will include the complete LinkedIn profile in a JSON format.

The output json include the following fields:

Their are few other less interesting fields: