LK_Scraper : An Fully Configurable LinkedIn Scrape

Lk_scraper is an fully configurable LinkedIn scrape : scrape anything within LinkedIn

Installation

$ pip install git+git://github.com/jqueguiner/lk_scraper

Setup

  • Using Docker compose

$ docker-compose up -d
$ docker-compose run lk_scraper python3

  • Using Docker only for selenium server

First, you need to run a selenium server

$ docker run -d -p 4444:4444 –shm-size 2g selenium/standalone-firefox:3.141.59-20200326

After running this command, from the browser navigate to your IP address followed by the port number and /grid/console. So the command will be http://localhost:4444/grid/console.

Also Read – Lollipopz : Data Exfiltration Utility For Testing Detection Capabilities

Retrieving Cookie

  • Browser-Independent:
  1. Navigate to Linkedin.com and log in
  2. Open up the browser developer tools (Ctrl-Shift-I or right click -> inspect element)
  • Chrome:
    • Select the Application tab
    • Under the Storage header on the left-hand menu, click the Cookies dropdown and select www.linkedin.com
    • Find the li_at cookie, and double click the value to select it before copying
  • Firefox:
    • Select Storage tab
    • Click the Cookies dropdown and select www.linkedin.com
    • Find and copy the li_at value

Setting Up The Cookie

  • Method 1 : Setting the cookie in the config file

You can add your LinkedIn li_at cookie in the config file that is located in your home (~/.lk_scraper/config.yml) see

  • Method 2 : Setting the cookie at the Scraper level

from lk_scraper import Scraper
li_at = “My_super_linkedin_cookie”
scraper = Scraper(li_at=li_at)

  • Method 3 : Using Variable Environment

(Not implemented Yet)

$ export LI_AT=”My_super_linkedin_cookie”

Example

run the jupyter notebook linkedin-example.ipynb

  • Usage

>>from lk_scraper import Scraper
>>scraper = Scraper()

  • Company Scraping

>>from lk_scraper import Scraper
>>scraper = Scraper()
>>company = scraper.get_object(object_name=’company’, object_id=’apple’)

  • Profile Scraping

>>from lk_scraper import Scraper
>>scraper = Scraper()
>>profil = scraper.get_object(object_name=’profil’, object_id=’jlqueguiner’)

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago