raven: Linkedin Information Gathering Tool

raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin.Please do not use this program to do stupid things. The author does not keep any responsability of what damage has been done by this program.




  • Run setup.sh as root
  • Adjust Linkedin credentials in raven.py or pass them as parameters.
  • If you are running in Kali Linux , to avoid problems with selenium update firefox to the latest version.
Usage of this is application is pretty simple. It requires at least three parameters. The first one is the company name , the second one is the country initials and the domain name.


How to use?

usage: raven.py [-h] -c COMPANY -s STATE -d DOMAIN [-p PAGES] [-lu LUSERNAME] [-lp LPASSWORD]
Raven – LinkedIn Information Gathering Tool

  -c COMPANY, –company COMPANY       Input the Company name. Ex: Pizzahut

-s STATE, –state STATE             Input the State initials. Ex: uk , al , etc…

-d DOMAIN, –domain DOMAIN          Input the domain name. Ex: gmail.com

-p PAGES, –pages PAGES             Number of google pages to navigate. Ex: 3

-lu LUSERNAME –lusername LUSERNAME    The linkedin username to use.

  -lp LPASSWORD, –lpassword LPASSWORD   The linekdin password to use.
For example , if the company that you want to search is Evil Corp and the state is Albania the parameters would be:

python raven.py -c ‘Evil Corp’ -s al -d evilcorp.al

If you are not sure what the state is you can put www .
You can also specify how many pages of Google Search you want to search with the -p parameters

python raven.py -c ‘Evil Corp’ -s al -d evilcorp.al -p 3

The command above will search for results on 3 first pages of google.
The tool actually is a scraper that works with selenium. It uses a google dork to extract the LinkedIn url’s and then it exctracts data from them. As you may know Linkedin has different subdomains for country-s.

  For example : al.linkedin.com is for Albania, uk.linkedin.com is for United Kingdom etc.

The state parameter is actually the subdomain of the LinkedIn website.


Irfan Shakeel
Irfan Shakeel, the founder of ehacking project, he also hosts cyber security training classes at EH Academy. He has discovered many vulnerabilities in the famous platforms (like Google, Dailymotion, Harvard University & etc.). He specializes in Network hacking, VoIP pentesting & digital forensics. He is the author of the book title “Hacking from Scratch”.

Most Popular

How To Create A Virtual Penetration Testing Lab At Home

In this article, I will demonstrate how to create your own virtual penetration testing lab at home. Creating a pentesting lab is must for...

The Importance of Cyber Security in The Medical Device Industry

Medical devices are a revolutionary aspect of healthcare - they connect doctors and patients, help diagnose and treat diseases. Some - like ECMO machines...

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...