Undetectable Chromium that passes all thirty bot detection tests
GitHub RepoImpressions2.2k

Undetectable Chromium that passes all thirty bot detection tests

@githubprojectsPost Author

Project Description

View on GitHub

The Undetectable Chromium: A Browser That Actually Passes Bot Tests

If you've ever tried to automate a browser for scraping, testing, or automation, you know the pain. The moment you fire up a headless Chrome or even a driven browser instance, you're often met with a wall of bot detection. Cloudflare challenges, reCAPTCHAs, and blocked requests become the norm, not the exception. It's an endless game of cat and mouse.

What if you could just… not play that game? That's the promise of CloakBrowser, a project that's been turning heads with a bold claim: it's a Chromium browser that passes all thirty of the major bot detection tests.

What It Does

CloakBrowser is a modified version of the Chromium browser, specifically engineered to be indistinguishable from a human-driven browser. It's not just another automation library that tries to patch over the gaps with clever JavaScript or user-agent spoofing. Instead, it works at a lower level, modifying the Chromium source itself to remove or alter the tell-tale signatures that bot detection services look for.

Think of it as Chromium, but with its digital fingerprints thoroughly wiped clean. The goal is to make automated instances appear exactly like a regular user's browser session, bypassing the common heuristics used for blocking bots.

Why It's Cool

The clever part isn't just that it works—it's how it works. Instead of layering fixes on top of a standard browser, the CloakBrowser team has forked and modified the Chromium source code directly. This allows them to address detection vectors that are simply impossible to fix from the outside using Puppeteer or Playwright scripts alone.

These detection tests look for thousands of data points: from the way your browser renders fonts and canvas elements, to subtle timing discrepancies in JavaScript execution, to the specific hierarchy of your browser's objects. CloakBrowser tackles these at the core.

The repository states it passes all tests from platforms like FingerprintJS, PerimeterX, and DataDome. For developers in web scraping, automated testing, or even building privacy-focused tools, this is a significant leap. It turns a constant defensive battle into a potentially solved problem.

How to Try It

The project is open source and available on GitHub. You can build it from source, which involves checking out their modified Chromium codebase and following the build instructions. It's a substantial compile, as you'd expect with Chromium, so be ready for that.

The quickest way to get a sense of it is to head to the GitHub repository. Read through the README for the latest build instructions and prerequisites. There isn't a pre-packaged binary for every platform yet, so diving into the source is the way to go.

Check out the repository here: github.com/CloakHQ/CloakBrowser

Final Thoughts

As a developer, my first reaction is cautious optimism. The approach of modifying Chromium at the source level is the right one for truly solving detection. If it lives up to its claims, this could save countless hours of maintenance for teams fighting detection scripts.

That said, it's an arms race. Detection services will adapt. The value of CloakBrowser will be in how well it's maintained and how quickly it can respond to new detection methods. For now, it represents one of the most promising approaches I've seen to level the playing field.

It's a powerful tool. As always, use it responsibly and in accordance with the terms of service of the websites you interact with. For legitimate use cases like automated testing, accessibility tools, or aggregating your own data, it could be a game-changer.


Follow us for more interesting projects: @githubprojects

Back to Projects
Project ID: f1c379f8-4432-42c4-a4fd-09bd79f5d8f0Last updated: March 14, 2026 at 12:31 AM