Feature — Authenticated scraping

Scrape pages you are logged into. Without uploading your cookies anywhere.

LinkedIn, Gmail, Stripe, Notion, Salesforce, HubSpot — if you can open it in Chrome, Stekpad can scrape it. Your session stays on your machine. Nothing leaves your browser.

The problem

Every hosted scraper wants your cookies

To scrape a page behind a login, traditional scrapers ask you to upload your session cookie to their cloud. PhantomBuster, Evaboot, Waalaxy, Dripify — same pattern. They log in as you from their datacenter IPs, and LinkedIn, Gmail, or Stripe flags the mismatch in hours.

This is why "safe LinkedIn scraping" is a contradiction with hosted tools. The only safe way to scrape an authenticated page is to scrape it from the same browser you already logged in with.

How Stekpad handles it

Your browser, your session, your IP

Stekpad is a Chrome extension. When you click "scrape", the extension runs in the current tab with the full context of your already-authenticated session. LinkedIn sees a request from the same browser and the same IP as every other interaction. There is no mismatch to detect.

Cookies never leave your machine. They never hit a Stekpad server. They never get written to disk outside of Chrome. The extension is source-available — you can audit exactly what it does with your session.

What you can scrape

Any logged-in surface

💼

LinkedIn + Sales Navigator

Profiles, follower lists, search results, company pages, event attendees.

📧

Gmail + Outlook

Thread lists, sender metadata, labels, search results. All within your session.

💳

Stripe, HubSpot, Salesforce

CRM data, customer lists, transaction logs, invoice rows.

📝

Notion, Airtable, Linear

Private workspaces and databases. Scrape exactly what you see in your dashboard.

Own your scraping. Own your session.

Your data, your browser, your rules. Free forever for personal use.

Stekpad — Scrape Behind Login, Runs in Your Browser — Stekpad