Skip to content

🤖 Advanced Privacy Browser Core with Unified Fingerprint Defense: Cloudflare, Akamai, Kasada, Shape, DataDome, PerimeterX, hCaptcha, FunCaptcha, Imperva, reCAPTCHA, ThreatMetrix, Adscore

License

Notifications You must be signed in to change notification settings

botswin/BotBrowser

Repository files navigation

🤖 BotBrowser

Advanced Privacy Browser Core with Unified Fingerprint Defense 🚀

Identical privacy posture on any OS • Cross-platform compatibility • Fingerprint protection validated across 31+ tracking scenarios

Latest Release Commit Activity Issues GitHub Forks GitHub Stars

BotBrowser GUI - Your Command Center

What Is BotBrowser?

BotBrowser is a privacy first browser core that keeps fingerprint signals uniform across every platform, preventing tracking systems from collecting and correlating tracking data to identify users across devices. Run the same profile on Windows, macOS, or Linux and the fingerprint posture stays identical each time.

All engineering focuses on privacy research, cross-platform tracking-resistance validation, and maintaining protected environments for authorized defensive benchmarking. Review the project Legal Disclaimer and Responsible Use Guidelines before using the software.


Why BotBrowser

What makes BotBrowser different: Cross-platform privacy browser core with unified fingerprint technology that prevents tracking data collection and device linkage.

High-fidelity Profile Simulation keeps synthetic and aggregated fingerprints ready for policy-compliant privacy experiments Latest Chromium Base stays synced to the newest stable Chrome so trackers cannot key on stale engines
Advanced Programmatic Control offers Playwright/Puppeteer integration with CDP leak blocking so privacy tooling leaves no telemetry residue Network Stack Parity with Full-Proxy QUIC/STUN (UDP over SOCKS5, ENT Tier3 feature) delivers Chromium-level tunneling so geo metadata does not leak and privacy labs maintain clean transport parity
Distributed Privacy Consistency lets you verify privacy protection across multiple browser instances simultaneously with Mirror, validating privacy posture in parallel (ENT Tier3 feature) Execution Environment Isolation provides clean contexts that prevent framework artifacts and external libraries from exposing privacy leaks through side channels

Cross-Platform Fingerprint Protection

  • Single profile, every host OS: identical UA, screen metrics, touch surfaces, fonts, and device APIs on Windows, macOS, Linux, and Android emulation so trackers see the same fingerprint everywhere.
  • Built-in configuration handles touch simulation, device metrics, and locale/timezone detection from the proxy IP while still allowing CLI overrides when privacy experiments require them.
  • Quick demos: ▶️ CreepJS Android▶️ Iphey▶️ Pixelscan

Getting Started

Quick Start

Step 1: Download

Step 2: Launch (⚠️ use absolute paths)

  • Windows example:
    chrome.exe --bot-profile="C:\absolute\path\to\profile.enc" --user-data-dir="%TEMP%\botprofile_%RANDOM%"
  • macOS/Linux commands follow the same pattern; see INSTALLATION.md for full instructions.

Step 3: Verify

  • Visit CreepJS or your preferred tracking observatory to confirm identical privacy posture.
  • Timezone/locale/language auto-derive from your proxy/IP; override via CLI only when needed.

📖 Complete Installation Guide →

Minimal Playwright Example

const browser = await chromium.launch({
  headless: true,
  executablePath: BOTBROWSER_EXEC_PATH,
  args: [`--bot-profile=${BOT_PROFILE_PATH}`],
  '--proxy-server="socks5://usr:pwd@127.0.0.1:8989"',  // or: "http://usr:pwd@127.0.0.1:8989"
});
const page = await browser.newPage();
await page.addInitScript(() => { delete window.__playwright__binding__; delete window.__pwInitScripts; });
await page.goto('https://abrahamjuliot.github.io/creepjs/');

Notes:

  • Use --user-data-dir with a unique temporary folder to avoid conflicts with running Chromium instances
  • Prefer --proxy-server or per-context proxies (ENT Tier1); auto timezone/locale detection applies in both cases
  • Avoid framework-specific proxy/auth options (e.g., page.authenticate()), which disable BotBrowser's geo-detection and may leak location information

Examples: PlaywrightPuppeteer

More options:

Advanced Capabilities

Professional-grade privacy technology built on multi-layer fingerprint protection, network-stack control, and hardening.

  • Multi Layer Noise: Canvas, WebGL, WebGPU, text, and AudioContext surfaces share deterministic, cross-worker noise with low-level Skia and HarfBuzz tuning so observers cannot correlate runs
  • Execution Environment Isolation: Clean execution contexts prevent framework artifacts from exposing privacy leaks, framework-less --bot-script, and console suppression PRO toggles maintain protected fingerprints across all execution modes
  • Configurable Stack: 30+ CLI overrides, per-context proxies (ENT Tier1) with auto geo, and session tooling (cookies, bookmarks, title, history) make privacy scripting flexible
  • Typography Fidelity: DOM text renders from embedded Windows, macOS, and Android font packs so host fonts never leak during cross-OS simulation
  • Client Hints Lockstep: DPR, device-memory, and UA-CH headers match JavaScript-visible values to keep header data in sync with runtime fingerprints
  • Headless ↔ GUI Parity: Identical GPU, WebGPU, and media signals across browser modes so privacy regression tests remain stable
  • Performance Controls: Precision FPS (ENT Tier2) and memory timings plus timing controls (ENT Tier1) and noise seeds (ENT Tier2) for reproducible privacy benchmarks
  • Focus & Session Control: Always-active tabs, configurable ICE presets, and expanded media reporting keep privacy sessions believable
  • Network Enhancements: per-context proxies (ENT Tier1) and optional local DNS solver (ENT Tier1), UDP-over-SOCKS5 (ENT Tier3), and SOCKS5H protocol support for tunnel-based resolution
Fingerprint Protection Implementation: Privacy Controls → Technical Design → Validation

This reference maps privacy protection goals to BotBrowser implementation details and validation evidence.

Privacy Protection Implementation Reference
API standardization navigator.webdriver standardized across all platforms so trackers cannot use API presence/absence as identification signal ADVANCED_FEATURES#Chrome Behavior Emulation
Execution environment protection Isolated execution context prevents framework artifacts from exposing privacy leaks ADVANCED_FEATURES#Playwright/Puppeteer Integration
Graphics rendering consistency Deterministic noise across Canvas, WebGL, WebGPU, and audio ensures protected fingerprints even in GPU-dependent scenarios ADVANCED_FEATURES#Graphics & Rendering Engine
GPU fingerprint uniformity Canvas and WebGPU rendering shares deterministic properties so GPU probes like WebBrowserTools return authentic results CHANGELOG#2025-12-08
Typography consistency Embedded font engines for Windows, macOS, Linux, and Android ensure text rendering remains identical across platforms ADVANCED_FEATURES#Cross-Platform Font Engine
Font availability uniformity DOM queries return authentic font lists from embedded bundles so host system fonts cannot leak platform identity ADVANCED_FEATURES#Cross-Platform Font Engine
Device capabilities Profile-based device properties maintain protected device claims across all platforms Profile Configs
Network topology privacy WebRTC signaling stays protected through SDP and ICE controls preventing network topology leakage ADVANCED_FEATURES#WebRTC Leak Protection
User agent coherence Browser brand and version parity prevents UA string from revealing platform differences CLI_FLAGS#Profile Configuration Override Flags
Header to API parity Client Hints headers DPR, device-memory, and UA-CH align with JavaScript reported values preventing header based identification ADVANCED_FEATURES#Browser & OS Fingerprinting
Execution mode parity GPU, WebGPU, and media signals remain identical whether running headless or in GUI mode ADVANCED_FEATURES#Headless & Incognito Compatibility
DNS privacy Use local DNS solver (ENT Tier1) for private resolution that avoids DNS leaks and provider restrictions, or use SOCKS5H to keep DNS within proxy tunnels CLI_FLAGS#Enhanced Proxy Configuration
Public IP discovery Customizable IP lookup backend for geo derivation via --bot-ip-service (supports comma-separated endpoints; BotBrowser races them and uses the fastest successful response) CLI_FLAGS#Enhanced Proxy Configuration
Protocol conformance HTTP/2 and HTTP/3 behavior matches Chrome specifications preventing protocol based differentiation ADVANCED_FEATURES#Chrome Behavior Emulation
TLS fingerprint protection JA3, JARM, and ALPN parameters optimized for uniform TLS negotiation across platforms CHANGELOG

Fingerprint Protection Matrix: Cross-Platform Coverage

Category Sample Capabilities
Graphics Canvas/WebGL rendering, GPU micro-benchmarks, texture hash configuration
Network WebRTC SDP configuration, proxy auth, connection management
Platform Font fallback chains, cross-worker protection, OS-specific features
Performance FPS simulation, memory timing, animation frame optimization

📖 Complete Advanced Features Documentation →


Configuration & Profiles

📢 BotBrowser combines synthetic and aggregated profiles with flexible configuration for authorized privacy research. Profile protection and CLI settings enable comparative analysis without leaking host traits.

  • Profile Foundation: Synthetic and aggregated profiles provide realistic fingerprint data for authorized privacy testing
  • CLI Flexibility: Override profile settings at runtime without modifying encrypted files
  • Cross-Platform Compatibility: A macOS profile works on Ubuntu; a Windows profile works on macOS; an Android profile can be fully emulated on any OS
  • Smart Configuration: Timezone, locale, and languages intelligently derived from IP/proxy
  • CLI Flags: See the ⚙️ CLI flags reference - Recommended for most users

⚠️ Note: This project must only be used in environments you own or where you have explicit authorization. Use against third-party services without permission is strictly prohibited and undermines the privacy mission.


BotBrowserConsole (GUI Tool)

Prefer a GUI launcher? See console/README.md for BotBrowserConsole usage, multi-instance management, and privacy profile selection.


Mirror: Distributed Privacy Consistency

Ensure your privacy protection works effectively across platforms and networks. Run a controller instance and multiple client instances to verify that all instances maintain identical privacy defenses, protecting you from tracking across Windows, macOS, Linux, and remote environments.

Launch with CLI flags: --bot-mirror-controller-endpoint=127.0.0.1:9990 on the controller, --bot-mirror-client-endpoint=127.0.0.1:9990 on each client. Runtime activation via CDP is also supported for programmatic control.

See Mirror documentation for detailed setup, testing procedures, and troubleshooting.


Fingerprint Protection Validation

Validation Methodology

Our fingerprint protection validation examines how standardized browser fingerprints prevent tracking systems from collecting tracking data to identify users across platforms. By maintaining identical fingerprints across operating systems, we demonstrate how privacy protection prevents the tracking methods that malicious observers rely on.

⚠️ Research validation uses authorized test environments. See DISCLAIMER.

Cloudflare Protection Validation ▶️ Validation Recording CreepJS Fingerprint Analysis ▶️ Desktop Protection / ▶️ Android Profile
DataDome Detection Environment ▶️ Scenario Analysis FingerprintJS Pro Analysis ▶️ Tracking Methodology
PerimeterX Protection Study ▶️ Protection Validation Pixelscan Fingerprint Assessment ▶️ Comprehensive Study

Cross-Platform Protection Validation

  • Windows Profile on macOS: Fingerprint protection maintained so privacy defenses remain effective across platforms
  • Android Emulation on Desktop: Mobile API parity enables fingerprint testing for cross-device privacy research
  • Headless vs GUI Mode: Identical fingerprint behavior ensures privacy validation results remain effective across execution contexts

📖 Complete Validation Results & Research Data → - 31+ tracking analysis scenarios, 15+ tracking methodologies, statistical analysis


Resources & Support

Documentation

Document Description Content Preview
Installation Guide Platform-specific setup Windows/macOS/Ubuntu guides, Docker deployment, troubleshooting
Advanced Features Technical capabilities 30+ CLI flags, privacy noise augmentation, GPU micro-benchmarks
Validation Results Research data 31+ tracking observatories, 50,000+ test sessions, statistical analysis
CLI Flags Reference Command-line options --bot-config-* flags, proxy auth, session management
Profile Configuration Profile customization Fingerprint control, cross-platform compatibility
Mirror Distributed privacy consistency Verify privacy protection across multiple browser instances simultaneously
CanvasLab Canvas forensics tool Canvas 2D recording with JSONL viewer (deterministic replay under development)
Examples Code samples Playwright, Puppeteer, bot-script integration

Quick Access

Framework Integration:

Profile Management:

Support Channels

📧 EmailTechnical questions, source code accessbotbrowser@bk.ru
📱 TelegramCommunity support, quick questions@botbrowser_support

Building from Source

For advanced users who want to build BotBrowser from source:

  1. Requirements: Linux build environment, Chromium build tools
  2. Source Access: Available to qualified researchers and institutions

Contact botbrowser@bk.ru for source code access and compilation instructions.

Debugging & FAQs

Issue Platform Solution
"Chromium" is damaged macOS Run xattr -rd com.apple.quarantine /Applications/Chromium.app
Missing dependencies Ubuntu Run sudo apt-get install -f
Profile file permission errors All Ensure .enc file has read permissions (chmod 644)
BotBrowser won't start or crashes All Check that your OS and Chromium version match the build; update BotBrowser to the latest release

Responsible Use

  • Review the detailed Responsible Use Guidelines and Legal Disclaimer before requesting binaries or premium profiles.
  • Maintain written authorization for every environment you test, and record the synthetic data sets you rely on.
  • Contact the maintainers at botbrowser@bk.ru if you observe suspicious activity or need to report an abuse incident.

Legal Disclaimer & Terms of UseResponsible Use Guidelines. BotBrowser is for authorized fingerprint protection and privacy research only.