Skip to content

exploit-development/linkedin-email-recon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

8 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

LinkedIn Email Recon Tool – Generate Email Addresses from Employee Names

A Python-based GUI tool to perform LinkedIn recon and generate company email addresses from employee name lists. Ideal for red teams, OSINT professionals, and penetration testers.


πŸŽ₯ Demo Video

LinkedIn Email Recon Demo


πŸ” What It Does

  • Extracts employee names from a LinkedIn company "People" page
  • Supports common corporate email formats
  • Builds a list of likely email addresses (e.g. john.doe@example.com) using scraped names
  • Lets you review results, preview email structure, and export to CSV
  • Fully manual login and scrolling for stealth and realism

🧩 Key Features

  • βœ… Manual login through real browser window (no API, no automation bans)
  • βœ… Extracts names of employees from LinkedIn
  • βœ… Supports formats: firstname.lastname, firstnamelastname, j.doe, and more
  • βœ… Domain input (e.g. @example.com)
  • βœ… Live email preview and name selection
  • βœ… Export to .csv for phishing, enumeration, or red teaming
  • βœ… Built with tkinter GUI for portability and ease of use

πŸ“¦ Setup

git clone https://github.com/intelligencegroup-io/linkedin-email-recon.git
cd linkedin-email-recon

python3 -m venv venv
source venv/bin/activate

pip install selenium pandas
sudo apt install chromium-driver

πŸš€ How to Use

python3 linkedin-email-recon.py

Workflow

  1. Paste the LinkedIn "People" page URL (e.g. https://www.linkedin.com/company/example/people/)
  2. Launch browser β†’ Log in manually β†’ Scroll to load all names
  3. Return to GUI and click Scrape Names
  4. Select valid names from the list
  5. Enter a domain (e.g. example.com) and choose a format
  6. Preview the generated emails
  7. Export the final list to CSV

πŸ“‚ Example Output

John Doe <john.doe@example.com>
Jane Doe <jane.doe@example.com>
J Doe <j.doe@example.com>

🧠 Use Cases

  • Red team email harvesting
  • OSINT and LinkedIn-based recon
  • Pretexting and phishing simulation
  • Username generation for login portals
  • Credential stuffing or validation prep

⚠ Disclaimer

This tool is intended strictly for authorised security assessments. Do not use it against any targets without written permission.


πŸ“„ License

MIT License β€” use freely for ethical hacking and training purposes.

About

A Python-based GUI tool to perform LinkedIn recon and generate company email addresses from employee name lists. Ideal for red teams, OSINT professionals, and penetration testers.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages