Automates public profile discovery for CISO, CEO, and other key roles using Google Programmable Search. Extracts LinkedIn profile links, names, and timestamps to a structured Google Sheet for OSINT, exposure analysis, or Red Team prep.
Red Teams planning phishing simulations
OSINT investigators and social engineers
Cybersecurity trainers mapping exposure risk
This workflow simulates role-based OSINT (Open Source Intelligence) by performing automated LinkedIn discovery using Google Search. Here's a breakdown:
Trigger :
Load Roles to Target :
"CISO site:linkedin.com/in/") from a pre-filled input list or Google Sheet.Query Google Custom Search API :
Parse and Extract :
Output :
role, name, snippet, url, timestampOptional enhancements can include:
Google Programmable Search Engine (API key + CX ID)
Google Sheets credentials
RedOps_SocialGraph_Log_Template.xlsx
name linkedin team status module timestamp
John Doe https://linkedin.com/in/johndoe GRC active Social_Graph_Builder 2025-07-27T12:00:00Z
Update queries (CISO, CEO, VP IT, etc.)
Filter results by region or org using site filters
Extend to track Twitter or GitHub links
linkedin.com/in/Use Authentication: YesThis tool uses public Google Search results. It is meant for educational or internal red teaming only. Do not use for scraping or unauthorized targeting.
๐ Part of the CYBERPULSE AI RedOps Suite
๐ https://cyberpulsesolutions.com
๐ง [email protected]