_______ _ ______
(_______) | | (____ \
_____ ____ | | _ ____ ____) ) ____ ___ _ _ _ ___ ____ ____
| ___)/ _ || | / )/ _ )| __ ( / ___)/ _ \ | | | | /___) / _ ) / ___)
| | ( ( | || |< (( (/ / | |__) )| | | |_| || | | ||___ |( (/ / | |
|_| \_||_||_| \_)\____)|______/ |_| \___/ \____|(___/ \____)|_|
- Basic version: Based on puppeteer, uses JavaScript hooks to modify properties and provides a simple api to make your web bot undetectable.
- Advanced version: fakechrome recompiled Chromium to complete the simulation more thoroughly.
Reverse engineering is not easy, and I would appreciate if you could give a β!
FakeBrowser automatic login demo:
- Using dumpDD.js to collect fingerprint from real users.
- Writing evasionsπ based on puppeteer-extra to simulate the above fingerprints and bypass anti-bot detection.
- Provide toolkit API to simulate real user's mouse and keyboard operations.
- Deploy to Linux and use Chrome/Edge in headless mode to SAVE COST. Reasons for not using Chromium: no support MP4 and few users using it.
- Captcha recognition from my another open source project: anti-captcha.
These pages use many fingerprinting techniques to detect if the browser is crawler software.
Results of running FakeBrowser on CentOS 7.9, Headless Chrome 93.0.4577.82, Socks5 proxy under AWS VPS:
Test page | Notes | Result |
---|---|---|
fingerprintjs | The basic fingerprint detection is easy to bypass. Even with the pro version, FakeBrowser is able to cheat easily. | π |
creepjs | Contains lots of advanced detection methods, bypassing it took me a lot of time, but he provides source code, thanks to the author. It uses Worker, ServiceWorker to detect at the same time, and FakeBrowser is perfectly bypassed. | π |
pixelscan | JS code is obfuscated and can only be restored through the AST tree. The vulnerability is the detection process submits results to server, and we can reverse their analysis process based on the results. It detects if the browser font matches the system in UserAgent. FakeBrowser emulates fonts in 4 ways to bypass the detection perfectly. | π |
amiunique | - | π |
browser-fingerprinting | This author is also working on anti-anti-bot systems, and I learned lots of knowledge from his repository, thank you very much! | π |
coveryourtracks | This site detects if your canvas/webgl fingerprint is stable by refreshing the page to check if you are a real environment. In fact, simply adding noise to canvas is not enough, undrawn rectangular areas are easily detected if they have noise. FakeBrowser uses an edge detection method that only adds noise to drawn edges of text, circles, ellipses. | π |
f.vision | - | π |
recaptcha-test | Detects how many points your browser scores in reCaptcha. | π |
deviceinfo | - | |
hackability | - | - |
sannysoft | No pressure to bypass. | π |
incolumitas | This guy also collects lots of bot detection methods, and his blog contains advanced methods for proxy/VPN detection, recommended following. BTW: He uses puppeteer-extra-plugin-strealth's code bugs for bot detection, and there's nothing he can do if I fix those bugs. His test results are very unstable, with FakeBrowser often jumping between 0.8 and 1.0. Even a normal browser's score can drop to 0.5. | π |
antoinevastel | Fingerprint detection page | π |
browserleaks | Everyone should know what this site is | π |
morellian | - | π |
vytal.io | - | π |