Snap Scraper is an open source intelligence tool which enables users to download media uploaded to Snapchat’s Snap Map using a set of latitude and longitude co-ordinates. This project is in no way affiliated with, authorized, maintained, sponsored or endorsed by Snap inc. or any of its affiliates or subsidiaries. This program is for education, forensic and bug reporting purposes only and is provided without warranty.
When using this tool please cite the following publication:
Screenshots
Installation
Download the current linked binary in the most recent release. Using terminal ensure you change permissions to include the executable permission.
chmod 755 SnapScraper
Optionally, a icon.png file is included which can be used to change the icon of the downloaded executable.
At this point in time, SnapScraper only supports MacOS. However, dependancies have been checked and users should be able to complile the code on their own file system without any issues. Ensure Alamofire has been installed.
Double click SnapScraper to launch the command line tool. SnapScraper works best when the defaul window size is set to 80×50.
You should be presented with the following window:
The current options for use are indicated in the command window. Select to option by pressing the required key(s) on the keyboard and pressing enter.
The main option users will select will be the check option to locate snap media on the Snap Map. To select this option type ‘c’ followed by the enter key.
SnapScraper will then ask you for a set of longitude and lattitude coordinates which can be obtained from map.snapchat.com as discussed in the publication “Richard Matthews, Kieren Lovell, Matthew Sorell, Ghost protocol – Snapchat as a method of surveillance, Forensic Science International: Digital Investigation, Volume 36, Supplement, 2021, 301112, ISSN 2666-2817, https://doi.org/10.1016/j.fsidi.2021.301112.”. Navigate to map.snapchat.com and note the URL of the location you wish to extract snap media from ie. https://map.snapchat.com/@24.931153,44.873214,6.04z. The coordinates to enter into SnapScraper are located in the URL after the @ symbol. The first number is the lattitude, the second the longitude and the final the zoom level. Lattitude and longitude should be entered into SnapScraper to 6 decimal places while zoom should be entered to 2 decimal places.
When each coordinate is entered into the program SnapScraper will then poll Snap Map for snap media at the desired location. When media is located the meta data of the media will be printed to the command window.
Users will then be given the option of printing direct links to the media to the command window. Select y to print these links to the command window or n to skip.
Users will then be given the option to save the links to a text file. Select y to save the file n to skip. File will be saved in the users “Downloads” directory in a folder called “Snapchat”(macOS users only). The file is titled with the current date, time and coordiates of extraction prefixed with the word “listing”.
Finally, users will be asked if they would like to download the media. This is the extraction step with media being saved directly from the URLs indicated in the previous steps. Select y to download, n to skip. Media will be saved in a folder titled with the current date, time and coordinates of extraction within the “Snapchat” folder previously identified above.
Currently log reporting has not been implremented in 0.5.0-b. To save a log of the extraction method use the “export text as” function built in to the terminal.
Finalise the extraction process as above and then quit SnapScraper by selecting “q”. The terminal session will end but the window will remain open as shown.
To save a log of activity navigate to Shell-> Export Text as… A save box will open. Navigate to the Snapchat folder within users Downloads folder and find the recent URL listing that has been saved (if used from previous steps). Click on this file and change the save as file name by removing the prefix word listing to log. This will save a text file contianing the contents of the terminal window and show all activity that was contducted while SnapScraper was run.
SnapScraper has a fully functional menu. Other options include displaying the MIT license, publication information associated with the current release of the tool, information to support the continued development and maintenance and the current development log. To access enter the relevant option keys followed by the enter key.
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…