A command-line tool to lookup employees for a given company.
Project description
Employees Lookup (emploo)
OSINT tool to list employees of a given company. Profiles discovering based on Linkedin data.
📋 Description
During an OSINT audit discovering company's employees can lead security experts to a valuable source of information. The goal of this tool is to give you automation to discover this kind of data. The JSON output can be used in your OSINT toolchain to automatize your reports generation by being piped with other tools.
This tool, is a command line tool who give you company profiles research results in JSON format.
This tool is compatible with Windows, Linux and Mac operanting systems.
✅ Prerequisites
To run emploo:
- you must own a valid google account.
- install python 3.9 or higher versions
💾 Install
$ pip install emploo
⚙️ Init your environment - First run only
Employees Lookup (emploo) is based on the Google Programmable Search Engine (GPSE). More info about GPSE are available here: https://developers.google.com/custom-search/docs/tutorial/creatingcse
Firstly, you must create a new empty GPSE by using the [control panel] (https://programmablesearchengine.google.com/controlpanel/all).
Once the new GPSE is create you should run the command $ emploo init
and,
by using the GPSE control panel, then, you should import the output of this
previous command as an annotation of your fresly created GPSE.
Now copy the GPSE ID corresponding to your fresly created GPSE. It will be passed to the emploo commands later.
At this point you should visit https://developers.google.com/custom-search/v1/overview and click on the "Get a Key" button to obtain your google API key. It will be passed to the emploo commands later.
Store your credentials to reuse them later during your researches.
🚀 Usage
Simply run the following command and obtain your results at the json format:
$ emploo search <company name> -i <google-gpse-id> -k <google-api-key> -o /tmp/example
The previous command search for the given company name by using the given
credentials, and output its results into the /tmp/example
file.
Replace <company name>
by the name of the company that you want to lookup.
Replace <google-gpse-id>
and <google-api-key>
by your own credentials.
⚠️ Warnings
Google API usages are limited to 100 results max. Even if you own a premium Google account this threshold still apply. In other words, for now, you can't collect more than 100 profiles with this tools, but 100 profiles is still a good starting point to ignit your investigations.
Also you should notice that the Google GPSE queries are limited to a quotas allowed by days. You are not able to proceed researches against an infinite number of companies each days. You should perform your researches on a daily basis.
😉 Contribute
If you want to contribute to this project please first read the contribution guidelines
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file emploo-0.1.1.tar.gz
.
File metadata
- Download URL: emploo-0.1.1.tar.gz
- Upload date:
- Size: 49.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/4.0.2 CPython/3.11.6
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | cb70807ca03cf0f71985d8eecb961bc4adcfa5d85982e53da509e0b6150629e5 |
|
MD5 | 114241af7b9380e1b289634f1d2f1c54 |
|
BLAKE2b-256 | ccfc1df0a0bf5f5d9a67763a27f75616d5104ac21a1ecdd79d329e36702ea48c |
File details
Details for the file emploo-0.1.1-py3-none-any.whl
.
File metadata
- Download URL: emploo-0.1.1-py3-none-any.whl
- Upload date:
- Size: 5.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/4.0.2 CPython/3.11.6
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 4885c1dfd64b395d5bc0c20a13c8adc9bad14d010e021cfca3df02713bbcad7a |
|
MD5 | a4af9f3c130940c633308037eb65678e |
|
BLAKE2b-256 | aa5c4e4f3e24b396f1f2823217752aab3d969f5d7775edf5a2247570049da5a4 |