
Scrapes any Linkedin data.
Installation
$ pip install git+git://github.com/jqueguiner/lk_scraper
Setup
Using Docker compose
$ docker-compose up -d
$ docker-compose run lk_scraper python3
Using Docker only for selenium server
First, you need to run a selenium server
$ docker run -d -p 4444:4444 --shm-size 2g selenium/standalone-firefox:3.141.59-20200326
After running this command, from the browser navigate to your IP address followed by the port number and /grid/console. So the command will be http://localhost:4444/grid/console.
Retrieving Cookie
Browser-Independent:
Navigate to Linkedin.com and log in Open up the browser developer tools (Ctrl-Shift-I or right click -> inspect element)
![]()
Chrome:
Select the Application tab
Under the Storage header on the left-hand menu, click the Cookies dropdown and select www.linkedin.com
Find the li_at cookie, and double click the value to select it before copying
Firefox:
Select Storage tab
Click the Cookies dropdown and select www.linkedin.com
Find and copy the li_at value
Setting up the cookie
Method 1: Setting the cookie in the config file
You can add your LinkedIn li_at cookie in the config file that is located in your home (~/.lk_scraper/config.yml) see:
Method 2: Setting the cookie at the Scraper level
from lk_scraper import Scraper
li_at = "My_super_linkedin_cookie"
scraper = Scraper(li_at=li_at)
Method 3: Using Variable Environment
(Not implemented Yet)
$ export LI_AT="My_super_linkedin_cookie"
A full working example
run the jupyter notebook linkedin-example.ipynb
Usage
from lk_scraper import Scraper
scraper = Scraper()
Company Scraping
from lk_scraper import Scraper
scraper = Scraper()
company = scraper.get_object(object_name='company', object_id='apple')
Profil Scraping
from lk_scraper import Scraper
scraper = Scraper()
profil = scraper.get_object(object_name='profil', object_id='jlqueguiner')
Author

- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Latest Articles
Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
Blog2022.10.12Vulnerability management with Wazuh open source XDR
Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
Subscribe
0 Comments