Snap-Scraper – Snap Scraper Enables Users To Download Media Uploaded To Snapchat’s Snap Map Using A Set Of Latitude And Longitude Coordinates

Snap Scraper is an open source

Installation

MacOS

Download the current linked binary in the most recent release. Using terminal ensure you change permissions to include the executable permission.

chmod 755 SnapScraper

Optionally, a icon.png file is included which can be used to change the icon of the downloaded executable.

Windows/Linux

At this point in time, SnapScraper only supports MacOS. However, dependancies have been checked and users should be able to complile the code on their own file system without any issues. Ensure Alamofire has been installed.

Usage

Double click SnapScraper to launch the

The current options for use are indicated in the command window. Select to option by pressing the required key(s) on the keyboard and pressing enter.

Check

The main option users will select will be the check option to locate snap media on the Snap Map. To select this option type ‘c’ followed by the enter key.

SnapScraper will then ask you for a set of longitude and lattitude coordinates which can be obtained from map.snapchat.com as discussed in the publication “Richard Matthews, Kieren Lovell, Matthew Sorell, Ghost protocol – Snapchat as a method of surveillance, Forensic Science International: Digital Investigation, Volume 36, Supplement, 2021, 301112, ISSN 2666-2817,

Users will then be given the option of printing direct links to the media to the command window. Select y to print these links to the command window or n to skip.

Users will then be given the option to save the links to a text file. Select y to save the file n to skip. File will be saved in the users “Downloads”

To save a log of activity navigate to Shell-> Export Text as… A save box will open. Navigate to the Snapchat folder within users Downloads folder and find the recent URL listing that has been saved (if used from previous steps). Click on this file and change the save as file name by removing the prefix word listing to log. This will save a text file contianing the contents of the terminal window and show all activity that was contducted while SnapScraper was run.

Other options

SnapScraper has a fully functional menu. Other options include displaying the MIT license, publication information associated with the current release of the tool, information to support the continued development and maintenance and the current development log. To access enter the relevant option keys followed by the enter key.

Contributing

SnapScraper was born out of a discussion in 2017 while in Tallinn Estonia. In the spirit of that initial collaboration I’d love for you to help bring this project to its full vision. The wiki contains a road map for the codebase including a wishlist of future functionality.

Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.

Please make sure to update tests as appropriate.

Dontations

Dontations are appreciated to help support the continued development, maintenance and upkeep of this product.

Dontate using Monero: 41hZLF5Mhh7gDeiTLLws8dXMsi9NpyM6cWUQJoTJNAWkbx4YccDagRMWYED4cyHw481VjYyiEgkEh9mxHR1tJeNy7ce9yNp

Funding goals include:

  • Server hosting for a web hosted version of SnapScraper.
  • Support for Windows file system.
  • Filtering of downloaded media to flag for NSFW content (triage).
  • Automated scraping by geofence and time.
  • Long term data storage, enabling historical, sociological and other areas of research (Internet Archive, but for Snapmap).

Credits

Project Lead

  • Richard Matthews

Automated Content Moderation Team

  • Matthew Sorell
  • Sanjana Tanuku
  • Siyu Wang
  • Liyu Xu

Acknowledgements

  • Ben Agnew – Thanks for the Developer mode discussions during CSRB in 2019!
  • Kieren Lovell – Minesweeper extraordinaire.
  • Matthew Sorell – Forensics and more.

Repos used

  • Alamofire – https://github.com/Alamofire/Alamofire

Publications

  1. Richard Matthews, Kieren Lovell, Matthew Sorell. “Ghost protocol – Snapchat as a method of surveillance”, Forensic Science International: Digital Investigation, Volume 36, Supplement, 2021, 301112, ISSN 2666-2817, https://doi.org/10.1016/j.fsidi.2021.301112.
  2. Richard Matthews. “Snapchat Disclosed on HackerOne: CreatorID Leaked from Public Content Posted to SnapMaps”, May 7, 2020. Accessed November 06, 2021. https://hackerone.com/reports/867521.

License

MIT (c) 2020 Dr Richard Matthews

Disclaimer

This project is in no way affiliated, associated, authorised or endorsed by the education institutions of those indicated in the credits section of this repo. This includes but is not limited to The University of Adelaide, Australia and TalTech (Tallinn University of Technology).

This project is not affiliated, associated, authorized, endorsed by, or in any way officially connected with the application Snapchat, Snap inc. or any of its subsidiaries or its affiliates. The official Snapchat website can be found at http://www.snapchat.com.

The names Snap, Snap Map, and Snapchat as well as related names, marks, emblems and images are registered trademarks of their respective owners.

All names, logos, images and brands are property of their respective owners.

This tool is provided as is for instructional purposes only without any warranty. Any use is not authorised or implied.

Download Snap-Scraper

If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.

Discord

Original Source