CloakBrowser
Stealth Chromium browser with source-level C++ fingerprint patches that passes bot detection tests — a drop-in Playwright/Puppeteer replacement for Python and JavaScript.
At a Glance
Fully free and open-source under the MIT license. No subscriptions, no usage limits.
Engagement
Available On
Listed May 2026
About CloakBrowser
CloakBrowser is an open-source stealth Chromium browser built by CloakHQ that modifies browser fingerprints at the C++ source level rather than through JavaScript injection or config flags. It ships as a thin Python and JavaScript wrapper around a custom-compiled Chromium binary, making it a drop-in replacement for Playwright and Puppeteer with the same API. The project is MIT-licensed (wrapper code) and freely available on GitHub and PyPI/npm.
What It Is
CloakBrowser is a browser automation tool in the anti-detect / stealth browser category. Its core job is to make automated Chromium sessions indistinguishable from real human browser sessions, preventing bot detection systems from blocking or challenging automated scripts. Unlike tools such as playwright-stealth or undetected-chromedriver that inject JavaScript or tweak launch flags, CloakBrowser patches Chromium's C++ source code directly — meaning fingerprint modifications are compiled into the binary itself. The project's README states it passes tests against Cloudflare Turnstile, FingerprintJS, BrowserScan, ShieldSquare, and reCAPTCHA v3 (scoring 0.9, described as human-level).
How the Source-Level Patching Works
The binary ships with 57 fingerprint patches (as of Chromium 146) covering canvas, WebGL, audio, fonts, GPU, screen properties, WebRTC, network timing, hardware reporting, automation signal removal, and CDP input behavior. Key behaviors:
- No JavaScript injection — patches are compiled into the binary, not applied at runtime
- Auto-generated fingerprint seed — every launch produces a fresh, coherent random identity with no configuration required
humanize=Trueflag — replaces all Playwright/Puppeteer mouse, keyboard, and scroll calls with Bézier-curve movements, per-character typing timing, and realistic scroll patterns- Native SOCKS5 proxy support —
proxy="socks5://user:pass@host:port"works directly in all launch functions - GeoIP auto-detection —
geoip=Trueresolves timezone and locale from the proxy exit IP
The binary auto-downloads on first run (~200MB, cached locally) and is verified with SHA-256 checksums. Background update checks keep it current.
Platform and Deployment Support
CloakBrowser supports Linux x86_64, Linux arm64, macOS arm64 (Apple Silicon), macOS x86_64 (Intel), and Windows x86_64. It can be used locally, in Docker, or on a VPS with identical behavior across environments. A pre-built Docker image (cloakhq/cloakbrowser) is available on Docker Hub with required fonts pre-installed. The cloakserve CDP multiplexer mode allows running a persistent stealth browser container that accepts remote connections with per-connection fingerprint seeds via query parameters.
Framework Integrations
CloakBrowser is designed to integrate with the broader browser automation and AI agent ecosystem. The README lists integration examples for:
- browser-use, Crawl4AI, Scrapling, Crawlee (Python AI/scraping frameworks)
- Stagehand, LangChain (TypeScript/Python AI agent frameworks)
- Selenium, undetected-chromedriver (legacy automation)
- AWS Lambda (serverless deployment via container image)
Both Playwright (recommended) and Puppeteer backends are supported, with the README noting that Playwright is preferred for reCAPTCHA Enterprise due to lower CDP protocol leakage.
Update: v0.3.26 (Chromium 146.0.7680.177.4)
The latest release, published April 28, 2026, upgrades the Chromium base from 145 to 146 and expands the patch count from 49 to 57. Notable additions in recent releases include:
launch_context_async()— async counterpart tolaunch_context()- Native SOCKS5 proxy support with QUIC/HTTP3 tunneling via UDP ASSOCIATE
- WebRTC IP spoofing via
--fingerprint-webrtc-ip=auto - Proxy signal removal (DNS/connect/SSL timing zeroed, proxy cache headers stripped)
cloakserveCDP multiplexer rewritten as a multi-connection proxy with per-connection fingerprint seeds- Patchright backend option for suppressing additional CDP automation signals
The GitHub repository shows 8,209 stars and 600 forks as reported by the project's own About page, with active maintenance and community contributions.
Community Discussions
Be the first to start a conversation about CloakBrowser
Share your experience with CloakBrowser, ask questions, or help others learn from your insights.
Pricing
Open Source (MIT)
Fully free and open-source under the MIT license. No subscriptions, no usage limits.
- Full stealth Chromium binary with 57 C++ patches
- Python and JavaScript/TypeScript support
- Playwright and Puppeteer API compatibility
- humanize=True human behavior simulation
- Docker image
Capabilities
Key Features
- 49–57 source-level C++ patches on Chromium binary
- Drop-in Playwright and Puppeteer replacement (Python + JavaScript)
- humanize=True flag for human-like mouse, keyboard, and scroll behavior
- Auto-generated random fingerprint seed per launch
- Native HTTP and SOCKS5 proxy support
- GeoIP auto-detection for timezone and locale from proxy exit IP
- WebRTC IP spoofing
- Persistent browser profiles with cookie/localStorage persistence
- cloakserve CDP multiplexer for multi-connection stealth browser server
- Per-connection fingerprint seeds via CDP query parameters
- Auto-downloading and auto-updating stealth Chromium binary
- SHA-256 checksum verification for binary downloads
- Docker image with pre-installed fonts
- CLI for binary management (install, update, info, clear-cache)
- Patchright backend option for additional CDP signal suppression
- reCAPTCHA v3 score 0.9 (human-level, server-verified)
- Passes Cloudflare Turnstile, FingerprintJS, BrowserScan
- Fingerprint flags for GPU, screen, hardware, fonts, storage quota
- AWS Lambda deployment support
- Browser Profile Manager (self-hosted, separate Docker image)
