Automates public profile discovery for CISO, CEO, and other key roles using Google Programmable Search. Extracts LinkedIn profile links, names, and timestamps to a structured Google Sheet for OSINT, exposure analysis, or Red Team prep.
Red Teams planning phishing simulations
OSINT investigators and social engineers
Cybersecurity trainers mapping exposure risk
This workflow simulates role-based OSINT (Open Source Intelligence) by performing automated LinkedIn discovery using Google Search. Here's a breakdown:
Trigger:
Load Roles to Target:
"CISO site:linkedin.com/in/") from a pre-filled input list or Google Sheet.Query Google Custom Search API:
Parse and Extract:
Output:
role, name, snippet, url, timestampOptional enhancements can include:
Google Programmable Search Engine (API key + CX ID)
Google Sheets credentials
RedOps_SocialGraph_Log_Template.xlsx
name	linkedin	team	status	module	timestamp
John Doe	https://linkedin.com/in/johndoe	GRC	active	Social_Graph_Builder	2025-07-27T12:00:00Z
Update queries (CISO, CEO, VP IT, etc.)
Filter results by region or org using site filters
Extend to track Twitter or GitHub links
linkedin.com/in/Use Authentication: YesThis tool uses public Google Search results. It is meant for educational or internal red teaming only. Do not use for scraping or unauthorized targeting.
🔗 Part of the CYBERPULSE AI RedOps Suite
🌐 https://cyberpulsesolutions.com
📧 [email protected]