Enables automated browsing and data extraction from Amazon pages, bypassing anti-bot protections to access product information, pricing, and inventory data.
Bypasses Cloudflare protection and anti-bot measures to access protected websites and APIs that would normally block automated requests.
Provides community support and discussion channels for the stealth browser MCP server project.
Enables automated interaction with Instagram through undetectable browser automation, bypassing social media blocks and CAPTCHAs.
Allows automated access to Nike SNKRS and other Nike platforms, bypassing anti-bot protections for product monitoring and purchase automation.
Replaces the need for Postman by enabling AI agents to perform network debugging and API reverse engineering directly through browser automation.
Enables automated interaction with Ticketmaster platform, bypassing anti-bot protections for ticket monitoring and purchasing automation.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Stealth Browser MCPscrape product prices from a Cloudflare-protected e-commerce site"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Stealth Browser MCP
Undetectable browser automation for MCP-compatible AI agents.
Bypass Cloudflare, antibot systems, and social media blocks with real browser instances powered by nodriver + Chrome DevTools Protocol + FastMCP.
Table of Contents
Related MCP server: MCP Browser Use
Demo
Stealth Browser MCP bypassing Cloudflare, cloning UI elements, and intercepting network traffic — all through AI chat commands.
Features
Antibot bypass — Works on Cloudflare, Queue-It, and other protection systems that block traditional automation
90 tools across 11 sections — From basic navigation to advanced CDP function execution
Modular loading — Run the full 90-tool arsenal or a minimal 22-tool core; disable what you don't need
Pixel-accurate element cloning — Extract complete elements with all CSS, DOM structure, events, and assets via CDP
Network interception — Inspect every request, response, header, and payload through your AI agent
Dynamic hook system — AI-generated Python functions that intercept and modify network traffic in real-time
Instant text input — Paste large content via CDP or type with human-like keystrokes and newline support
Cross-platform — Windows, macOS, Linux, Docker, and CI/CD pipelines with automatic environment detection
Browser support — Chrome, Chromium, and Microsoft Edge (automatic detection)
Clean MCP integration — No custom brokers or wrappers; works with Claude Code, Claude Desktop, Cursor, and any MCP client
Quickstart
1. Clone and install
2. Add to your MCP client
Claude Code CLI (recommended):
Windows:
Mac/Linux:
Replace
/path/to/stealth-browser-mcp/with your actual project path.
Windows (%APPDATA%\Claude\claude_desktop_config.json):
Mac/Linux (~/Library/Application Support/Claude/claude_desktop_config.json):
3. Test it
Restart your MCP client and ask your agent:
"Use stealth-browser to navigate to https://example.com and take a screenshot."
Modular Architecture
Choose exactly what functionality you need. Run the full 90-tool suite or strip it down to 22 core tools.
Mode | Tools | Use Case |
Full (default) | 90 | Complete browser automation and debugging |
Minimal ( | 22 | Core browser automation only |
Custom ( | Your choice | Disable specific sections |
Available sections:
Section | Tools | Description |
| 11 | Core browser operations |
| 11 | Page interaction and manipulation |
| 9 | Element cloning and extraction |
| 9 | File-based extraction tools |
| 5 | Network monitoring and interception |
| 13 | Chrome DevTools Protocol execution |
| 10 | Advanced element cloning |
| 3 | Cookie and storage management |
| 5 | Tab management |
| 6 | Debug and system tools |
| 10 | AI-powered network hooks |
Toolbox
Tool | Description |
| Create undetectable browser instance |
| Navigate to URLs |
| Clean shutdown of browser |
| Manage multiple sessions |
| Full browser state information |
| Navigate back in history |
| Navigate forward in history |
| Reload current page |
| Reload modules without restart |
| Check module reload status |
Tool | Description |
| Find elements by CSS/XPath |
| Natural clicking |
| Human-like typing with newline support |
| Instant text pasting via CDP |
| Natural scrolling |
| Smart waiting |
| Run JavaScript |
| Dropdown selection |
| Element properties |
Tool | Description |
| Complete CDP-based element clone |
| Complete element cloning |
| Save complete extraction to file |
| 300+ CSS properties via CDP |
| Pure CDP styles extraction |
| Full DOM tree |
| React/Vue/framework listeners |
| CSS animations/transitions |
| Images, fonts, videos |
| Related CSS/JS files |
Tool | Description |
| Save styles to file |
| Save structure to file |
| Save events to file |
| Save animations to file |
| Save assets to file |
| Save complete clone to file |
| List saved clone files |
| Clean up old clone files |
Tool | Description |
| List captured network requests |
| Inspect headers and payload for a request |
| Get response data from a request |
| Add custom headers to requests |
| Block tracking scripts, ads, etc. |
| Create Python functions to intercept/modify requests |
| Quick hook creation with presets |
| List active hooks with statistics |
| Inspect hook source code |
| Remove a hook |
| Request object structure and HookAction types |
| 10 detailed examples: blockers, redirects, proxies |
| Pattern matching and best practices |
| Ad blocking, API proxying, auth injection |
| Validate hook code before deployment |
Tool | Description |
| Direct CDP commands (use snake_case) |
| Find JavaScript functions |
| Discover object methods (93+ methods) |
| Execute any function |
| Run custom JS code |
| Inspect function details |
| Functions that survive reloads |
| Execute function sequences |
| Create Python-JS bindings |
| Execute Python code via py2js |
| Get JS execution contexts |
| List available CDP commands |
| Get executor state info |
Tool | Description |
| Initial lightweight structure |
| On-demand styles expansion |
| On-demand events expansion |
| Progressive children expansion |
| Expand CSS rules data |
| Expand pseudo-elements |
| Expand animations data |
| List stored elements |
| Clear specific element |
| Clear all stored elements |
Tool | Description |
| Read cookies |
| Set cookies |
| Clear cookies |
| localStorage and sessionStorage snapshot |
| Read/modify storage via JS |
Tool | Description |
| List open tabs |
| Create new tab |
| Change active tab |
| Close tab |
| Get current tab |
Tool | Description |
| Capture screenshots |
| HTML and metadata |
| Debug info with pagination |
| Clear debug logs |
| Export logs (JSON/pickle/gzip) |
| Debug lock status |
| Diagnose platform issues and browser compatibility |
Stealth vs Playwright MCP
Feature | Stealth Browser MCP | Playwright MCP |
Cloudflare / Queue-It | Consistently bypasses | Commonly blocked |
Banking / Gov portals | Works | Frequently blocked |
Social media automation | Full automation | Captchas and bans |
UI element cloning | CDP-accurate extraction | Limited |
Network debugging | Full request/response inspection via AI | Basic |
API reverse engineering | Payload inspection through chat | Manual tools only |
Dynamic hook system | AI-generated Python functions for real-time interception | Not available |
Modular architecture | 11 sections, 22–90 tools | Fixed ~20 tools |
Total tools | 90 (customizable) | ~20 |
Tested on: LinkedIn, Instagram, Twitter/X, Amazon, banking portals, government sites, Cloudflare-protected APIs, Nike SNKRS, Ticketmaster, Supreme.
Troubleshooting
No compatible browser found
Install Chrome, Chromium, or Microsoft Edge. The server auto-detects the first available browser. Run validate_browser_environment_tool() to diagnose.
Tools hang or return malformed JSON
Debug output was printing to stdout, corrupting the MCP JSON-RPC protocol. This was fixed in #8. Pull the latest master branch.
Browser crashes on Linux / Docker / CI
Run with --sandbox=false or ensure your environment supports sandboxing. The server auto-detects root and container environments and adjusts accordingly.
Too many tools cluttering the AI chat
Use --minimal for 22 core tools, or selectively disable sections:
Module not found errors Make sure you activated the virtual environment and installed dependencies:
Examples
Market research — Extract pricing and features from competitors, output a comparison table
UI cloning — Recreate a pricing section with exact fonts, styles, and interactions
Inventory monitoring — Watch a product page and alert when stock changes
API reverse engineering — Intercept requests, map endpoints, and inspect data flow
All driven from a single AI agent conversation.
Showcase
Augment Code hero clone — A user asked Claude to clone the hero section from augmentcode.com. The agent spawned a stealth browser, navigated to the site, extracted the complete element via CDP (styles, structure, assets), and generated a pixel-accurate HTML recreation with responsive design and animations. The entire process took under two minutes of conversation.
View the recreation | Full walkthrough
Roadmap
See the live plan in ROADMAP.md. Contributions welcome.
Contributing
Read CONTRIBUTING.md and open a PR. First-time contributors welcome.
If this project saves you time, star the repo — it helps more than you think.
Support
If this tool saved you time or made you money, consider supporting development:
License
MIT — see LICENSE.