CrossLinked is a LinkedIn enumeration tool that uses search engine scraping to collect valid employee names from a target organization. This technique provides accurate results without the use of API keys, credentials, or even accessing the site directly. Formats can then be applied in the command line arguments to turn these names into email addresses, domain accounts, and more.
CrossLinked simplifies the processes of searching LinkedIn to collect valid employee names when performing password spraying or other security testing against an organization. Using similar search engine scraping capabilities found in tools like subscraper and pymeta.
For a full breakdown of the tool and example output, checkout:
The latest version of CrossLinked provides proxy support through the Taser library. Users can mask their traffic with a single proxy by adding
--proxy 127.0.0.1:8080 to the command line arguments, or use
--proxy-file proxies.txt for rotating source addresses.
http/https proxies can be added in
IP:PORT notation, while SOCKS requires a
Two additional scripts are included in this repo to aid in generating potential username and password files:
pwd_gen.py– Generates custom password lists using words and variables defined at the top of the script. Perform number/letter substitutions, append special characters, and more. Once configured, run the script with no arguments to generate a ‘passwords.txt’ output file.
user_gen.py– Generates custom usernames using inputs from firstname.txt and lastname.txt files, provided at the command line. Format is defined similiar to crosslinked.py and will be written to ‘users.txt’.