- Home
- Security Operations
- Offensive Security
- Linkedin2username
Linkedin2username
An OSINT tool that generates username lists for companies on LinkedIn for social engineering attacks or security testing purposes.

Linkedin2username
An OSINT tool that generates username lists for companies on LinkedIn for social engineering attacks or security testing purposes.
Linkedin2username Description
LinkedIn2Username is an OSINT tool that generates username lists for companies on LinkedIn, allowing users to gather information and identify potential targets for social engineering attacks or other security testing purposes. The tool utilizes LinkedIn's people search feature to gather employee data and generate a list of usernames, which can then be used for further reconnaissance or attack vectors. This tool is useful for penetration testers, bug bounty hunters, and security professionals looking to identify vulnerabilities in a company's security posture.
Linkedin2username FAQ
Common questions about Linkedin2username including features, pricing, alternatives, and user reviews.
Linkedin2username is An OSINT tool that generates username lists for companies on LinkedIn for social engineering attacks or security testing purposes.. It is a Security Operations solution designed to help security teams with Osint, Reconnaissance, Penetration Testing.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox