Quietly building. GitHub picked up +232 stars in 24h and Bluesky buzz (1 posts / 7d) and dev.to writeups (1 articles / 7d). Reddit and X are still cold — typical for a niche project at this stage.
Picked up 232 GitHub stars in the last 24 hours (momentum 23/100) — acute breakout in progress.
+232 stars 24h | +608 7d
10 in 24h | 1 source
2/6 channels firing
no linked package yet
last commit 15m ago
Each channel contributes 0-1. Per-channel tiers: GitHub (breakout 1.0 / hot 0.7 / rising 0.4), HN (front-page 1.0 / ≥3 mentions 0.7 / 1-2 mentions 0.4), Bluesky (≥5 mentions 1.0 / 2-4 0.7 / 1 0.4), dev.to (≥3 articles 1.0 / 2 0.7 / 1 0.4), Reddit (corpus-normalized 48h velocity), X (≥10 mentions 24h 1.0 / 3-9 0.7 / 1-2 0.4).
* Reddit bar shows a per-repo velocity proxy (raw score / 100); the score formula uses the corpus-normalized version so a single repo's bar may not match its contribution to the corpus-wide ranking.
// KNOWN REPO · PACKAGE · LAUNCH · SITE SURFACES
AISO scan
Scan queued — refresh to check status.
🌐 Make websites accessible for AI agents. Automate tasks online with ease.
🕵️♂️ Collect a dossier on a person by username from 3000+ sites
🕷️ An adaptive Web Scraping framework that handles everything from a single request to a full-scale crawl!
Stealth headless browser for AI agents — bypass Cloudflare, bot detection, and anti-scraping. Drop-in Puppeteer/Playwright replacement.
Python scraper based on AI
High-performance browser automation bridge and multi-instance orchestrator with advanced stealth injection and real-time dashboard.
Ranked confirmation layer for repo-specific X buzz in the last 24h.
CHROMİUM'U ALDILAR, İÇİNİ BOŞALTTILAR. Parmak izi yok. Bot imzası yok. Detection servislerine bakarsınız, sıradan kullanıcı görünür. Bunu Puppeteer scripti yazarak yapamazsınız, user-agent değiştirerek de. Çünkü tüm bu izler Chromium'un kaynak kodundan geliyor. CloakBrowser fork'layıp doğrudan değiştirdi. FingerprintJS, PerimeterX, DataDome dahil 30 test geçiyor. Açık kaynak. Sponsorlu falan değil, o adamlardan para alacak halim yok. Proje linki ilk yorumda, alın şu şaheseri inceleyin.
Matched through a repo-specific project phrase query.
Stealth browser automation just got interesting. CloakBrowser is a custom Chromium build designed to look like a real browser to anti-bot systems. No JS hacks, no config tricks. Fingerprints patched directly in the C++ source. Drop-in replacement for Playwright/Puppeteer. Python or JS. 3 lines of code.
Matched through a repo-specific project phrase query.
做爬虫或跑自动化脚本时,总会被各种反爬验证拦截,用常规的隐藏插件依然防不胜防。 今天看到 CloakBrowser 这个开源项目,直接在 C++ 源码层面修改了 Chromium 的指纹特征。 并非简单的 JS 注入或配置修改,而是从底层重构了画布、音频、硬件报告等核心信号。 开启拟人化参数后,连鼠标移动轨迹、键盘敲击延迟和页面滚动都能模拟真实用户的习惯。 GitHub: github.com/CloakHQ/CloakBrow… 只需修改几行导入代码,就能无缝接入现有的 Python 或 Node.js 项目,兼容 Playwright 和 Puppeteer。 还提供 Docker 镜像和持久化配置文件管理,适合部署到服务器长期运行。 正在做网页自动化的朋友,要是被反爬机制反复折腾,不妨试下这个开源方案。
Matched through a repo-specific project phrase query.
The methodology is simple: Instead of masking fingerprints at runtime… CloakBrowser modifies Chromium at the source level (C++). So the signals websites see come from the browser itself, not injected scripts.
Matched through a repo-specific project phrase query.
CloakBrowser : un Chromium modifié au niveau source C++ qui passe tous les tests de détection de bots (Cloudflare, reCAPTCHA, FingerprintJS). Remplacement direct pour Playwright/Puppeteer et open source. github.com/CloakHQ/CloakBrow…
Returned by a high-confidence repo query and contains a visible project phrase, but the exact URL, slug, or package name was not visible.
爬虫人和AI Agent开发者的福音来了! CloakBrowser —— 真正源代码级(C++)打补丁的 Stealth Chromium 浏览器! 不是JS注入、不是配置伪装,而是直接在Chromium二进制里打了49-57个指纹补丁! 核心亮点: 30/30 bot检测全通过(Cloudflare Turnstile、reCAPTCHA v3 0.9分、FingerprintJS、BrowserScan全绿) Playwright / Puppeteer 一行代码 drop-in 替换 humanize=True 真实鼠标曲线、键盘节奏、滚动行为,像真人一样 支持代理自动时区/语言匹配 + WebRTC IP伪装 + 持久化Profile pip install cloakbrowser 自动下载 stealth 二进制,零配置
Matched through a repo-specific project phrase query.
牛逼!CloakBrowser 宣称通过所有 bot detection 测试,并可作为 Playwright 替代。 自动化福音,我先mark下 开源地址: github.com/CloakHQ/CloakBrow…
Matched through a repo-specific project phrase query.
My Polymarket AI broke 5 times. After fixing it - it's a money printer > Stealth scraping failed. 8 commits, 6 hours Replaced everything with CloakBrowser - 33 C++ patches in Chromium. Real stealth lives in browser internals > Deepseek censors Taiwan, Ukraine, Trump > Built OpenAI fallback, then poisoned our own API keys. Cascading failure in 26 minutes > No single parser works. Built a chain of 7 fetchers - first two cover 75% of URLs > One LLM wasn't enough. Now it's a 5-agent Expert Council with Bayesian synthesis and veto power A detailed article covering the entire trip will be published soon. I’ll also be sure to explain why it’s a money printer
Matched through a repo-specific project phrase query.
💥🛡️🕵️♂️ ¡CloakBrowser es un Chromium con 49 parches C++ a nivel de código fuente! Pasa cada test anti-bot y consigue un 0.9 en reCAPTCHA v3. Ideal para #redteam y #osint ético. #ethicalhacking #ciberseguridad #opensource #pentest
Matched through a repo-specific project phrase query.
🚨 Someone just built a browser that's invisible to every bot detection system on the internet. 14 tests. 14 passed. Perfect score. It's called CloakBrowser. A modified Chromium that patches fingerprinting at the source level — not with JavaScript hooks that detection systems can find, but inside the browser engine itself where nothing can see it. Every major bot detection system you've heard of. Cloudflare. PerimeterX. DataDome. BotD. CreepJS. Fingerprint.com . All of them. Bypassed. Every single one. Here's why every other stealth browser fails. Tools like undetected-chromedriver and playwright-stealth work by injecting JavaScript that overrides browser fingerprinting APIs. They patch things like navigator.webdriver, canvas rendering, and WebGL after the browser loads. The problem: detection systems know exactly where to look for those patches. They check for the override patterns. They find them. They flag the session. CloakBrowser doesn't patch the JavaScript layer. It patches Chromium's C++ source code directly. The fingerprint modifications happen before any JavaScript ever runs. There's nothing to detect because the changes aren't sitting on top of the browser — they're baked into it. Here's what it actually patches: → Navigator and user agent properties — no webdriver flag, no automation signals → Canvas and WebGL fingerprinting — randomized at the rendering engine level → Audio fingerprinting — modified at the Web Audio API implementation → Font enumeration — controlled list, not the real system font list → Hardware concurrency and device memory — configurable, not real values → Chrome runtime object — present and correct, exactly as a real browser would show it → Timezone and locale — fully controllable without JavaScript detection Here's the wildest part. It's a drop-in Playwright replacement. If you're already using Playwright for browser automation, you change one import. That's it. Everything else stays identical. One import change. Your automation is now undetectable. The use cases write themselves. Web scraping without getting blocked. Automated testing on production sites with aggressive bot protection. Privacy research. Security auditing. Competitive intelligence gathering. 14 GitHub stars today. This one is going to grow fast. 100% Open Source. MIT License. GitHub link in the comments 👇
Matched through a repo-specific project phrase query.