ChrisAD / linkedin-employee-scraperView external linksLinks
Extract all employees from LinkedIn. Especially useful for companies with thousands of employees.
☆32Feb 21, 2022Updated 3 years ago
Alternatives and similar repositories for linkedin-employee-scraper
Users that are interested in linkedin-employee-scraper are comparing it to the libraries listed below
Sorting:
- A script used to query the dehashed API and filter for more useful results☆17Jun 20, 2021Updated 4 years ago
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆34Dec 18, 2025Updated last month
- Automatic Secret Finder - JWT, Access Token, API keys... Based on m4ll0k/SecretFinder☆32Jun 3, 2022Updated 3 years ago
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 6 years ago
- A tool for checking host for work: http, tcp, ping, dns☆10Feb 5, 2023Updated 3 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- ll In One Tool For Info Gathering, SQL Vulnerability Scannig and Crawling☆13Jun 10, 2017Updated 8 years ago
- A comprehensive OSINT (Open Source Intelligence) script that gathers detailed information about a target domain using various public sour…☆18May 19, 2024Updated last year
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 8 months ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago
- ☆11Apr 21, 2022Updated 3 years ago
- A quick and quadruple Instagram account hunting tool, you just have to put the bot token and hand your account and you will start hunting…☆12Jun 11, 2022Updated 3 years ago
- Burp Suite extension to detect Web Cache Deception vulnerabilities, now compatible with the Community Edition. Automates advanced cache …☆15Nov 18, 2025Updated 2 months ago
- ☆13Nov 3, 2023Updated 2 years ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- Sysmon Config Pusher - Modernized☆32Jan 7, 2026Updated last month
- Quick scan to find live hosts on the network/across networks☆48Jul 4, 2014Updated 11 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 6 months ago
- meow☆12Dec 6, 2015Updated 10 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 4 years ago
- Git mirror of http://mongoose.googlecode.com/svn☆13Sep 12, 2009Updated 16 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- Fetching data from system☆12Jun 18, 2017Updated 8 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 2 months ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 4 years ago
- Monitor collections of malicious Telegram bots used for phishing credential theft, to prevent frauds/dataleaks.☆14Jan 29, 2025Updated last year
- eZpublish vulnerability scanner☆10Feb 20, 2020Updated 5 years ago
- Zone-H Cybercrime Archive Telegram Monitoring Bot☆14Jun 10, 2025Updated 8 months ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Kaze's openly available CVE vulnerability data.☆15Apr 7, 2025Updated 10 months ago
- ☆15May 3, 2024Updated last year