A fully human-like browser automation agent with advanced hardware fingerprint spoofing capabilities.
This project contains code designed to alter or mask browser fingerprints and to bypass bot detection techniques. Do not use this code to access systems you do not own or do not have explicit, written permission to test! Illegal or unethical use is strictly prohibited. You accept full responsibility for any actions taken with this code.
- For security research, QA, authorized penetration testing, red/blue team training, and education.
- Not for abuse. Not for bypassing access controls!
CMIFC (Catch Me If You Can) is an advanced stealth scraping framework designed to bypass sophisticated anti-bot detection systems. It combines hardware fingerprint spoofing, human-like behavior simulation, and comprehensive browser automation concealment.
- Hardware Fingerprint Spoofing: Consistent WebGL, CPU, and memory profiling
- CDP-based Concealment: Chrome DevTools Protocol optimizations
- Canvas Fingerprinting Protection: Randomized pixel noise injection
- WebGL Debug Removal: Blocks
WEBGL_debug_renderer_infodetection - Automation Flag Elimination: Removes all Selenium/WebDriver traces
- Page-Type Specific Behavior: Different patterns for forums, articles, generic sites
- Realistic Scroll Patterns: Irregular scrolling with micro-movements and pauses
- Natural Click Delays: Pre- and post-click timing variations
- Reading Simulation: Variable pause durations mimicking human reading speeds
- Dynamic User-Agent Rotation: Windows, Mac, Linux profiles
- Language Localization: German/English language preferences
- Hardware Consistency: Platform-specific hardware profiles
- Plugin Simulation: Realistic browser plugin arrays
pip install seleniumSystem Requirements:
- Chrome/Chromium browser
- ChromeDriver (compatible with your Chrome version)
- Python 3.8+
-
*Download CMIFC.py
-
Install ChromeDriver:
- Download from ChromeDriver website
- Ensure it's in your PATH or specify the path in the script
-
Verify installation:
python CMIFC.pyfrom CMIFC import stealth_xpath_extraction
# Extract XPaths from a website
xpaths = stealth_xpath_extraction("https://example.com", page_type="article")
for item in xpaths:
print(f"XPath: {item['xpath']}")
print(f"Tag: {item['tag']}")
print(f"Text: {item['text']}")from CMIFC import create_stealth_driver, human_like_behavior
driver = create_stealth_driver()
try:
driver.get("https://target-site.com")
human_like_behavior(driver, "forum")
# Your automation code here
finally:
driver.quit()from CMIFC import test_stealth_detection
# Test your stealth configuration
test_stealth_detection("https://bot.sannysoft.com")forum: Quick scanning with back-scrolls and irregular pausesarticle: Slow, methodical reading with long pausesgeneric: Standard browsing with random scroll patterns
The script automatically selects appropriate hardware profiles based on User-Agent:
- Windows: Intel hardware, 4-16GB RAM
- Mac: Apple Silicon/AMD, 8-32GB RAM
- Linux: Generic Mesa/X.org, 2-8GB RAM
from CMIFC import human_like_click
element = driver.find_element("xpath", "//button")
human_like_click(driver, element)def custom_behavior(driver):
# Implement your own human behavior simulation
passThe script includes comprehensive testing to verify stealth effectiveness:
test_stealth_detection()Expected Output:
๐ CMIFC Stealth Test Results:
Webdriver detected: None
Chrome runtime: True
Hardware Concurrency: 8
Device Memory: 16
โ
Stealth Mode: ACTIVATED and CONSISTENT.
Important Disclaimer:
- This tool is designed for ethical security research, penetration testing, and authorized data collection
- Always respect
robots.txt, terms of service, and applicable laws - Obtain proper authorization before testing any systems
- The authors are not responsible for misuse of this tool
- โ Security research and penetration testing
- โ Authorized web application testing
- โ Competitive analysis (where permitted)
- โ Academic research
- โ Evidence collection for legal purposes
- โ Unauthorized scraping
- โ Denial of service attacks
- โ Credential stuffing
- โ Fraudulent activities
- โ Violating terms of service
CMIFC employs multiple layers of concealment:
- Browser Automation Flags: Complete removal of WebDriver indicators
- Hardware Consistency: Matching User-Agent with hardware capabilities
- Behavioral Patterns: Human-like interaction timing and patterns
- Fingerprint Spoofing: Canvas, WebGL, and audio context protection
- Network Characteristics: Realistic browser fingerprinting
-
ChromeDriver Version Mismatch
# Check Chrome version google-chrome --version # Download matching ChromeDriver version
-
Headless Detection
- Use
--headless=newflag for modern headless mode - Ensure all stealth optimizations are applied
- Use
-
Performance Optimization
- Limit element processing with
elements[:80] - Adjust random delay ranges for your use case
- Limit element processing with
- Selenium WebDriver team for robust browser automation
- Chrome DevTools Protocol for advanced browser control
- Security researchers advancing anti-bot detection
Catch Me If You Can!
For educational and authorized security research purposes only.
The modular file is only an example of how to build a headless bot that works like a human. The parsing of data is limited to extracting XPath and CSS selectors to analyze sites with your external tools. Against Kiddies!
Copy-paste this into an email or doc when requesting testing permission.
Permission for Browser Testing and Data Collection
This document grants [Your Name / Organization] permission to perform browser testing and data access on [Target Domain / URL], limited to the scope defined below.
Scope:
- Automated browsing for research and testing.
- Collection of basic page metadata and DOM structure.
- No attempts to access authenticated areas, private user data, or bypass controls.
Duration:
- From [start date] to [end date].
Signed:
[Target Owner Name], [Title]
[Signature or Email Confirmation]
[Date]
- Keep screenshots, request logs, and timestamps.
- Preserve written consent.
- If you find a vulnerability, follow coordinated disclosure.
- Stop immediately if requested by the target owner.
- Minimize load. Respect rate limits and crawl-delay.
- Prefer APIs over scraping when possible.
- Experimental. Results vary by Chrome version and target site.
- Not a guaranteed bypass for modern anti-bot systems.
- Headless mode may reduce site functionality.
THIS SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. THE AUTHORS, MAINTAINERS, CONTRIBUTORS, AND DISTRIBUTORS DISCLAIM ALL WARRANTIES, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS, MAINTAINERS, CONTRIBUTORS, OR DISTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, PUNITIVE OR CONSEQUENTIAL DAMAGES, LOSS OF PROFITS, LOSS OF DATA, INTERRUPTION OF BUSINESS, OR ANY OTHER DAMAGES WHATSOEVER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, ARISING OUT OF OR IN CONNECTION WITH THE USE OR MISUSE OF THIS SOFTWARE.
This project is intended solely for lawful security research, authorized penetration testing, red/blue team training, and educational use. You must obtain explicit, written permission from the owner of any systems you test. Do not use this software to access systems, data, or content you are not authorized to access.
By using this software you agree to indemnify, defend, and hold harmless the authors, maintainers, contributors, and distributors from and against any claims, liabilities, damages, losses, costs, and expenses (including reasonable attorneysโ fees) arising from or related to your use, misuse, or distribution of the software.
You are responsible for ensuring compliance with all applicable laws, regulations, and export controls in your jurisdiction and the jurisdiction of any target.
Keep written proof of consent when conducting tests. Maintain logs, timestamps, and contact information of the authorizing party. If requested by an owner or authority, you must provide evidence of authorization.
This text is a template only and does not constitute legal advice. Consult a qualified attorney for a binding liability strategy.
By submitting code, documentation, issues, or other contributions to this repository you confirm:
- You have the right to contribute the content.
- You grant the project a perpetual, worldwide, non-exclusive, royalty-free license to use your contribution.
- You agree that your contribution does not violate any law or third-party right.
- You agree to the Liability & Indemnity section above and will indemnify the project for claims arising from your contributions.
If you do not accept these terms, do not submit a contribution.
Copy into your permission email or attach to requests.
- Target domain / IPs:
- Allowed actions: (e.g., crawl public pages, collect DOM, no auth bypass)
- Time window:
- Rate limits:
- Contact person (name + email):
- Written confirmation (attach email or signed doc)
Code credits: Volkan Sah (2023โ2025). MIT license