Automates public profile discovery for CISO, CEO, and other key roles using Google Programmable Search. Extracts LinkedIn profile links, names, and timestamps to a structured Google Sheet for OSINT, exposure analysis, or Red Team prep.
Red Teams planning phishing simulations
OSINT investigators and social engineers
Cybersecurity trainers mapping exposure risk
This workflow simulates role-based OSINT (Open Source Intelligence) by performing automated LinkedIn discovery using Google Search. Here's a breakdown:
Trigger:
Load Roles to Target:
"CISO site:linkedin.com/in/"
) from a pre-filled input list or Google Sheet.Query Google Custom Search API:
Parse and Extract:
Output:
role
, name
, snippet
, url
, timestamp
Optional enhancements can include:
Google Programmable Search Engine (API key + CX ID)
Google Sheets credentials
RedOps_SocialGraph_Log_Template.xlsx
name linkedin team status module timestamp
John Doe https://linkedin.com/in/johndoe GRC active Social_Graph_Builder 2025-07-27T12:00:00Z
Update queries (CISO, CEO, VP IT, etc.)
Filter results by region or org using site filters
Extend to track Twitter or GitHub links
linkedin.com/in/
Use Authentication: Yes
This tool uses public Google Search results. It is meant for educational or internal red teaming only. Do not use for scraping or unauthorized targeting.
🔗 Part of the CYBERPULSE AI RedOps Suite
🌐 https://cyberpulsesolutions.com
📧 [email protected]