Scrapes any Linkedin data.
$ pip install git+git://github.com/jqueguiner/lk_scraper
Using Docker compose
$ docker-compose up -d $ docker-compose run lk_scraper python3
Using Docker only for selenium server
First, you need to run a selenium server
$ docker run -d -p 4444:4444 --shm-size 2g selenium/standalone-firefox:3.141.59-20200326
After running this command, from the browser navigate to your IP address followed by the port number and /grid/console. So the command will be http://localhost:4444/grid/console.
Navigate to Linkedin.com and log in Open up the browser developer tools (Ctrl-Shift-I or right click -> inspect element)
Select the Application tab Under the Storage header on the left-hand menu, click the Cookies dropdown and select www.linkedin.com Find the li_at cookie, and double click the value to select it before copying
Select Storage tab Click the Cookies dropdown and select www.linkedin.com Find and copy the li_at value
Setting up the cookie
Method 1: Setting the cookie in the config file
You can add your LinkedIn li_at cookie in the config file that is located in your home (~/.lk_scraper/config.yml) see:
Method 2: Setting the cookie at the Scraper level
from lk_scraper import Scraper li_at = "My_super_linkedin_cookie" scraper = Scraper(li_at=li_at)
Method 3: Using Variable Environment
(Not implemented Yet)
$ export LI_AT="My_super_linkedin_cookie"
A full working example
run the jupyter notebook linkedin-example.ipynb
from lk_scraper import Scraper scraper = Scraper()
from lk_scraper import Scraper scraper = Scraper() company = scraper.get_object(object_name='company', object_id='apple')
from lk_scraper import Scraper scraper = Scraper() profil = scraper.get_object(object_name='profil', object_id='jlqueguiner')
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
- Blog2022.10.12Vulnerability management with Wazuh open source XDR
- Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
- Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
View all comments