Linkedin Scraper - An fully configurable Linkedin scrape


Scrapes any Linkedin data.


$ pip install git+git://


Using Docker compose

$ docker-compose up -d
$ docker-compose run lk_scraper python3

Using Docker only for selenium server

First, you need to run a selenium server

$ docker run -d -p 4444:4444 --shm-size 2g selenium/standalone-firefox:3.141.59-20200326

After running this command, from the browser navigate to your IP address followed by the port number and /grid/console. So the command will be http://localhost:4444/grid/console.

Retrieving Cookie


Navigate to and log in
Open up the browser developer tools (Ctrl-Shift-I or right click -> inspect element)  


Select the Application tab
Under the Storage header on the left-hand menu, click the Cookies dropdown and select
Find the li_at cookie, and double click the value to select it before copying


Select Storage tab
Click the Cookies dropdown and select
Find and copy the li_at value

Setting up the cookie

Method 1: Setting the cookie in the config file

You can add your LinkedIn li_at cookie in the config file that is located in your home (~/.lk_scraper/config.yml) see:

Method 2: Setting the cookie at the Scraper level

from lk_scraper import Scraper
li_at = "My_super_linkedin_cookie"
scraper = Scraper(li_at=li_at)

Method 3: Using Variable Environment

(Not implemented Yet)

$ export LI_AT="My_super_linkedin_cookie"

A full working example

run the jupyter notebook linkedin-example.ipynb


from lk_scraper import Scraper
scraper = Scraper()

Company Scraping

from lk_scraper import Scraper
scraper = Scraper()
company = scraper.get_object(object_name='company', object_id='apple')

Profil Scraping

from lk_scraper import Scraper
scraper = Scraper()
profil = scraper.get_object(object_name='profil', object_id='jlqueguiner')


April 21, 2020


Hakin9 TEAM
Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023