Snap-Scraper – Snap Scraper Enables Users To Download Media Uploaded To Snapchat's Snap Map Using A Set Of Latitude And Longitude Coordinates

AVvXsEgWG ekiBrAxg9ExW0j1 o7kODkdKQemFWWPGTaK 6 2oAz2j6EvlzaDnrUHwwZd5YGV3MRs3Ed45frUfspGaiiQY8qmK5PZY3hq56bp

Snap Scraper is an open source intelligence tool which enables users to download media uploaded to Snapchat’s Snap Map using a set of latitude and longitiude co-ordinates. This project is in no way affiliated with, authorized, maintained, sponsored or endorsed by Snap inc. or any of its affiliates or subsidiaries. This program is for education, forensic and bug reporting purposes only and is provided without warranty.

When using this tool please cite the following publication:

  1. Richard Matthews, Kieren Lovell, Matthew Sorell, Ghost protocol – Snapchat as a method of surveillance, Forensic Science International: Digital Investigation, Volume 36, Supplement, 2021, 301112, ISSN 2666-2817,


AVvXsEhbq knQyrRWc7ZzlIJXmEb0Hojbxv7jIMYxck2r2bzM7Ie3nbDz4wIjwnveZEeZHnYEWojaQfrj1tpIFnV5d8QuTvbiq5WyZ3xgi00BDXxzDz6RxFe I7OnZfJlLCXxybhbVLAN9pY41cJ2ABWu7TlK8v2M6jDBWtOHX vFl9PckXd2HuWBbHmL5McAw=w534 h640

AVvXsEhQLKsz3 WV274Bw8J9nsSjk6HLgyXXSHXH3ITzziPdpfY5yXs0YiglLwFI18TSNP25DZU JC2niDub2L4KsayzVZZVaBs0znDmi piiVxHsUCtG0hdGV mfuM2rKySZKTop9jUbXcRCQInRsXg3a2agEI3n46hhru6 6GxqLZY1QBK8T J gmI Gl59g=w592 h640

AVvXsEiq0CMrxmRn8zm8OkWX Eb zqaJPzREFE5QGO6HfRQXZvCYIWW iTiTLHH iXVmbLisRWeWMv3NSTl9vh3yzEBgnRPQHfhkRhLw6460iL LqAkdpdXZpaEdGpHWwjS3iaIkT7viFLW41PAOP7uLQaI7GEau0 Qc0DMYc2IQ3owAlSlw6aa7izLQsBTS g=w570 h640

AVvXsEgxdPTjSDlIqvw3XBJjvKSwyW56JO3dexM6R2VGNVC0kTM3t2JxOztz2W hLNE9d8 Ovmy5bL24ZQDH4 KfKNs1gwho0t4R9nFRbVpRAHe79vXtLVQLTFOuFOWTWgYiOGr2UOAJPiZgYHjYVKIiqjnGM5ln0tM6KRS6 J3FfVD oKmB3Luc8qQGJqEXQQ=w572 h640

AVvXsEhv0bTi1RgLmjEC7qeoeOjjI1cVgrl09W2O7N91kr OXIzl5VDVawTTDUt48Ge0vvyFpfD nS6bPv719KzYlnuDOmjXT73s1uRi2LV SNO5IwZAt1eJJ OZ8ctVXC3OT0GZXMd59vwB PS2aK1gG7lDgB48qAl L0G4cQ5aaaqnW4F8 D hwm6 RZ30kw=w640 h340



Download the current linked binary in the most recent release. Using terminal ensure you change permissions to include the executable permission.

chmod 755 SnapScraper

Optionally, a icon.png file is included which can be used to change the icon of the downloaded executable.


At this point in time, SnapScraper only supports MacOS. However, dependancies have been checked and users should be able to complile the code on their own file system without any issues. Ensure Alamofire has been installed.


Double click SnapScraper to launch the command line tool. SnapScraper works best when the defaul window size is set to 80×50.

You should be presented with the following window:

AVvXsEjMo QcS8jaD1EjmMpF73bXe r7QlRWxREvkkKU8XnvU73XT1xQqiOxILArDiRbB4upw eWi1Fz1 uWpbph8zP5 fFf Qci1FMnd TzdOcPhM lLSEMWd02flvEqN9Ox tXvR1OqrSR2jkgk8uff6MMhcEdiOIWo3ddVxjVvd1n1nfMcYsS39ggj61 w=w534 h640

The current options for use are indicated in the command window. Select to option by pressing the required key(s) on the keyboard and pressing enter.


The main option users will select will be the check option to locate snap media on the Snap Map. To select this option type ‘c’ followed by the enter key.

SnapScraper will then ask you for a set of longitude and lattitude coordinates which can be obtained from as discussed in the publication “Richard Matthews, Kieren Lovell, Matthew Sorell, Ghost protocol – Snapchat as a method of surveillance, Forensic Science International: Digital Investigation, Volume 36, Supplement, 2021, 301112, ISSN 2666-2817,”. Navigate to and note the URL of the location you wish to extract snap media from ie.,44.873214,6.04z. The coordinates to enter into SnapScraper are located in the URL after the @ symbol. The first number is the lattitude, the second the longitude and the final the zoom level. Lattitude and longitude should be entered into SnapScraper to 6 decimal places while zoom should be entered to 2 decimal places.

When each coordinate is entered into the program SnapScraper will then poll Snap Map for snap media at the desired location. When media is located the meta data of the media will be printed to the command window.

AVvXsEjQVmOtHKc aQFgneYiRjMEtgIi2ob18oNlDJm7nVjSCiTFPuBu8W5Oftl8E 7UPFg O7fMRKWBpO9NiSSXu2odpZlbJr8P0PWIH8smNj8Jj9w5k6Cqce8JxFYpH1FJ6XaDmcuSCud1EQPDqbEg8RDaKa1ATGfvEDBdCZuo6fRKLyAoTyOTOdzyE kaLQ=w592 h640

Users will then be given the option of printing direct links to the media to the command window. Select y to print these links to the command window or n to skip.

Users will then be given the option to save the links to a text file. Select y to save the file n to skip. File will be saved in the users “Downloads” directory in a folder called “Snapchat”(macOS users only). The file is titled with the current date, time and coordiates of extraction prefixed with the word “listing”.

Finally, users will be asked if they would like to download the media. This is the extraction step with media being saved directly from the URLs indicated in the previous steps. Select y to download, n to skip. Media will be saved in a folder titled with the current date, time and coordinates of extraction within the “Snapchat” folder previously identified above.

Log reporting

Currently log reporting has not been implremented in 0.5.0-b. To save a log of the extraction method use the “export text as” function built in to the terminal.

Finalise the extraction process as above and then quit SnapScraper by selecting “q”. The terminal session will end but the window will remain open as shown.

AVvXsEiWxixNfeCP0lleKxJk92CaeA KbY JigplIKJ9r8Kg0fWtkIwl7T38QBXbhi vVRvARK58 ewLJFqzAGi Ho4ZcjeQQmBottdMT zMAbib3oTffSBXjsCCSJX1bQs7x TrCvtQqM9op66rDJ9WYda9wZjiwaCJkljnwtxJBMyc NHeesL9cxtx3GAtRg=w572 h640

To save a log of activity navigate to Shell-> Export Text as… A save box will open. Navigate to the Snapchat folder within users Downloads folder and find the recent URL listing that has been saved (if used from previous steps). Click on this file and change the save as file name by removing the prefix word listing to log. This will save a text file contianing the contents of the terminal window and show all activity that was contducted while SnapScraper was run.

Other options

SnapScraper has a fully functional menu. Other options include displaying the MIT license, publication information associated with the current release of the tool, information to support the continued development and maintenance and the current development log. To access enter the relevant option keys followed by the enter key.


SnapScraper was born out of a discussion in 2017 while in Tallinn Estonia. In the spirit of that initial collaboration I’d love for you to help bring this project to its full vision. The wiki contains a road map for the codebase including a wishlist of future functionality.

Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.

Please make sure to update tests as appropriate.


Dontations are appreciated to help support the continued development, maintenance and upkeep of this product.

Dontate using Monero: 41hZLF5Mhh7gDeiTLLws8dXMsi9NpyM6cWUQJoTJNAWkbx4YccDagRMWYED4cyHw481VjYyiEgkEh9mxHR1tJeNy7ce9yNp

Funding goals include:

  • Server hosting for a web hosted version of SnapScraper.
  • Support for Windows file system.
  • Filtering of downloaded media to flag for NSFW content (triage).
  • Automated scraping by geofence and time.
  • Long term data storage, enabling historical, sociological and other areas of research (Internet Archive, but for Snapmap).


Project Lead

  • Richard Matthews

Automated Content Moderation Team

  • Matthew Sorell
  • Sanjana Tanuku
  • Siyu Wang
  • Liyu Xu


  • Ben Agnew – Thanks for the Developer mode discussions during CSRB in 2019!
  • Kieren Lovell – Minesweeper extraordinaire.
  • Matthew Sorell – Forensics and more.

Repos used


  1. Richard Matthews, Kieren Lovell, Matthew Sorell. “Ghost protocol – Snapchat as a method of surveillance”, Forensic Science International: Digital Investigation, Volume 36, Supplement, 2021, 301112, ISSN 2666-2817,
  2. Richard Matthews. “Snapchat Disclosed on HackerOne: CreatorID Leaked from Public Content Posted to SnapMaps”, May 7, 2020. Accessed November 06, 2021.


MIT (c) 2020 Dr Richard Matthews


This project is in no way affiliated, associated, authorised or endorsed by the education institutions of those indicated in the credits section of this repo. This includes but is not limited to The University of Adelaide, Australia and TalTech (Tallinn University of Technology).

This project is not affiliated, associated, authorized, endorsed by, or in any way officially connected with the application Snapchat, Snap inc. or any of its subsidiaries or its affiliates. The official Snapchat website can be found at

The names Snap, Snap Map, and Snapchat as well as related names, marks, emblems and images are registered trademarks of their respective owners.

All names, logos, images and brands are property of their respective owners.

This tool is provided as is for instructional purposes only without any warranty. Any use is not authorised or implied.

click here to read full Article

Read More on Pentesting Tools

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *