CCIM - A Chrome Extension to Automatically Capture Ingress IntelMap Transition

CCIM is a full-auto screen grabber for Ingress IntelMap. It allows you to easily capture and download the screen of your choice in a snap. The main purpose of this extension is to help you to avoid the server's high intensity.

To work with this extension, first, you need to start the Chrome browser on your device. You will be able to see the options for saving in the menu on the right side of the screen. Now, you need to choose the desired tab and save the image.

CCIM automatically saves each file in a separate folder in your device's storage.

 0/1

App specs

  • License

    Free

  • Version

    0.1.7.6

  • Latest update

  • Platform

    chrome

  • Language

    English

    Available languages

    • English
    • Japanese
  • Developer

Program available in other languages



User reviews about CCIM: Closed-Circuit IntelMap

Have you tried CCIM: Closed-Circuit IntelMap? Be the first to leave your opinion!

Add review

Top extensions for Google Chrome

Top downloads Add-ons & Tools for Google Chrome

Top downloads Add-ons & Tools for Google Chrome

Top downloads Add-ons & Tools for Google Chrome

You may also like

Explore Apps

Latest articles

Laws concerning the use of this software vary from country to country. We do not encourage or condone the use of this program if it is in violation of these laws.
Softonic

Is CCIM: Closed-Circuit IntelMap safe?

100/100

Score result: Clean

This file passed a comprehensive security scan using VirusTotal technology. It is safe to download.

  • Virus free
  • Spyware free
  • Malware free
  • Verified by Security Partners

    VirusTotal logo

Scan Info

Last scan
Tuesday, January 9, 2024
Scan provider
VirusTotal

Softonic security commitment

CCIM: Closed-Circuit IntelMap has been thoroughly scanned by our advanced security systems and verified by industry-leading partners. This file comes from the official developer and has passed all our security checks, showing no signs of viruses, malware, or spyware. For more information, visit our Security and Trust Center