Instaloctrack, a tool to scrape geotagged locations on Instagram profiles. Output in JSON & interactive map.
Requirements
sudo apt install chromium-chromedriver && chmod a+x /usr/bin/chromedriver
Installation
git clone https://github.com/bernsteining/instaloctrack
cd instaloctrack
pip3 install .
Or use Docker:
sudo docker build -t instaloctrack -f Dockerfile .
Usage
instaloctrack -h
usage: instaloctrack [-h] [-t TARGET_ACCOUNT] [-l LOGIN] [-p PASSWORD] [-v]
Instagram location data gathering tool. Usage: python3 instaloctrack.py -t
optional arguments:
-h, –help show this help message and exit
-t TARGET_ACCOUNT, –target TARGET_ACCOUNT
Instagram profile to investigate
-l LOGIN, –login LOGIN
Instagram profile to connect to, in order to access
the instagram posts of the target account
-p PASSWORD, –password PASSWORD
Password of the Instagram profile to connect to
-v, –visual Spawns Chromium GUI, otherwise Chromium is headless
e.g.
instaloctrack -t
If the target profile is private and you have an account following the target profile you can scrape the data with a connected session:
instaloctrack -t -l -p
First, we retrieve all the pictures links of the account by scrolling the whole Instagram profile, thanks to selenium’s webdriver.
Then, we retrieve asynchronously (asyncio) each picture link, we check if it contains a location in the picture description, and retrieve the location’s data if there’s one, and the timestamp.
Because Instagram doesn’t provide GPS coordinates, and we’re only given names of places, we have to geocode these (.ie. get the GPS coords from the name’s place).
For this, I used Nominatim’s awesome API, which uses OpenStreetMap. For our usage, no API key is required, and we respect Nominatim’s usage Policy by requesting GPS co ordinatess once every second.
Eventually, once we have all the GPS co ordinatess, we generate a HTML (thanks to jinja2 templating) with Javascript embedded that plots an Open Street Map (thanks to Leaflet library) with all our locations pinned. Once again, no API key is required for this step.
Also, the data collected by the script (location names, timestamps, GPS coordinates, errors) are dumped to a JSON file in order to be re-used.
As an example, here’s the output on the former French President’s Instagram profile, @fhollande:
The JSON data dump (just a part of it to show the format for a given location):
{
“link”: “https://www.instagram.com/p/-Q_9EvR9eu”,
“place”: {
“id”: “290297”,
“name”: “Musée du quai Branly – Jacques Chirac”,
“slug”: “musee-du-quai-branly-jacques-chirac”,
“street_address”: ” 37 quai Branly”,
” zip_code”: ” 75007″,
” city_name”: ” Paris”,
” region_name”: ” “,
” country_code”: ” FR”
},
“timestamp”: “2015-11-19”,
“gps”: {
“lat”: “48.8566969”,
“lon”: “2.3514616”
}
}
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…