/ الدليل / الملعب / stealth-browser-mcp
● مجتمع vibheksoni ⚡ فوري

stealth-browser-mcp

بواسطة vibheksoni · vibheksoni/stealth-browser-mcp

90-tool MCP browser automation that bypasses anti-bot systems — network hooks, UI cloning, and CDP control via natural language.

stealth-browser-mcp is an MCP server for undetectable browser automation using nodriver and Chrome DevTools Protocol. It provides 90 tools across 11 categories: browser management, element interaction, pixel-perfect UI cloning, network debugging with dynamic hooks, CDP functions, progressive cloning, cookies/storage, tabs, and page analysis. Bypasses Cloudflare and similar protections. Works with Claude, Cursor, and other MCP clients.

لماذا تستخدمه

الميزات الأساسية

عرض مباشر

كيف يبدو في الممارسة

stealth-browser-mcp.replay ▶ جاهز
0/0

التثبيت

اختر العميل

~/Library/Application Support/Claude/claude_desktop_config.json  · Windows: %APPDATA%\Claude\claude_desktop_config.json
{
  "mcpServers": {
    "stealth-browser-mcp": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  }
}

افتح Claude Desktop → Settings → Developer → Edit Config. أعد التشغيل بعد الحفظ.

~/.cursor/mcp.json · .cursor/mcp.json
{
  "mcpServers": {
    "stealth-browser-mcp": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  }
}

يستخدم Cursor نفس مخطط mcpServers مثل Claude Desktop. إعدادات المشروع أولى من الإعدادات العامة.

VS Code → Cline → MCP Servers → Edit
{
  "mcpServers": {
    "stealth-browser-mcp": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  }
}

انقر على أيقونة MCP Servers في شريط Cline الجانبي، ثم "Edit Configuration".

~/.codeium/windsurf/mcp_config.json
{
  "mcpServers": {
    "stealth-browser-mcp": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  }
}

نفس الصيغة مثل Claude Desktop. أعد تشغيل Windsurf لتطبيق التغييرات.

~/.continue/config.json
{
  "mcpServers": [
    {
      "name": "stealth-browser-mcp",
      "command": "TODO",
      "args": [
        "See README: https://github.com/vibheksoni/stealth-browser-mcp"
      ]
    }
  ]
}

يستخدم Continue مصفوفة من كائنات الخادم بدلاً من خريطة.

~/.config/zed/settings.json
{
  "context_servers": {
    "stealth-browser-mcp": {
      "command": {
        "path": "TODO",
        "args": [
          "See README: https://github.com/vibheksoni/stealth-browser-mcp"
        ]
      }
    }
  }
}

أضف إلى context_servers. يعيد Zed التحميل تلقائيًا عند الحفظ.

claude mcp add stealth-browser-mcp -- TODO 'See README: https://github.com/vibheksoni/stealth-browser-mcp'

أمر من سطر واحد. تحقق باستخدام claude mcp list. احذف باستخدام claude mcp remove.

حالات الاستخدام

استخدامات عملية: stealth-browser-mcp

How to scrape data from a Cloudflare-protected site for authorized research

👤 Researchers and data analysts who need data from protected sites they have permission to access ⏱ ~15 min intermediate

متى تستخدمه: You need to extract data from a site you're authorized to access but standard scraping tools get blocked.

المتطلبات الأساسية
  • stealth-browser-mcp installed — Clone repo, pip install -r requirements.txt
  • Authorization to access the target site — Ensure you have permission to scrape the site
الخطوات
  1. Navigate to the site
    Open a stealth browser and navigate to https://example.com/data. Wait for the page to fully load.✓ تم النسخ
    → Page loaded successfully, bypassing protection
  2. Extract data
    Query all elements matching the product listing cards. Extract titles, prices, and URLs.✓ تم النسخ
    → Structured data from the page

النتيجة: Data extracted from the protected site for authorized analysis.

المزالق
  • Running too many concurrent browsers — Keep to 1-2 browser instances at a time to avoid detection patterns
اجمعها مع: filesystem

Clone a UI element pixel-perfect for design reference

👤 Frontend developers who want to study and replicate a UI pattern ⏱ ~10 min intermediate

متى تستخدمه: You see a UI component you like and want the complete HTML/CSS for reference.

المتطلبات الأساسية
  • stealth-browser-mcp running — Start the MCP server
الخطوات
  1. Navigate and identify
    Open https://example.com and take a screenshot. I want to clone the navigation header.✓ تم النسخ
    → Screenshot with page rendered
  2. Clone the element
    Clone the nav header element completely — HTML structure, CSS styles, events, and animations. Save to a file.✓ تم النسخ
    → Complete element clone saved with all styles and assets

النتيجة: A self-contained HTML/CSS clone of the UI element for reference.

المزالق
  • Cloned elements may depend on external fonts or scripts — Use extract_element_assets to also capture referenced resources
اجمعها مع: filesystem

التركيبات

اجمعها مع خوادم MCP أخرى لتحقيق نتائج x10

stealth-browser-mcp + filesystem

Save scraped data and cloned UI elements to organized files

Scrape all product data from the page and save it as JSON to ~/data/products.json.✓ تم النسخ

الأدوات

ما يوفره هذا الـ MCP

الأداةالمدخلاتمتى تستدعيهاالتكلفة
spawn_browser options?: obj Launch a new stealth browser instance 0
navigate url: str Navigate to a URL 0
query_elements selector: str Find elements by CSS selector 0
clone_element_complete selector: str Pixel-perfect clone of a DOM element with all styles 0
create_dynamic_hook hook_function: str Create a Python function to intercept network traffic 0
take_screenshot selector?: str Capture a screenshot of the page or specific element 0
execute_script script: str Execute JavaScript in the page context 0

التكلفة والحدود

تكلفة التشغيل

حصة API
N/A — runs locally
الرموز لكل استدعاء
200–2000 tokens per tool call
التكلفة المالية
Free
نصيحة
Use core mode (22 tools) if your client struggles with the full 90-tool set.

الأمان

الصلاحيات والأسرار ونطاق الأثر

تخزين بيانات الاعتماد: No credentials stored by the server. If accessing authenticated sites, manage cookies via get/set_cookie tools.
نقل البيانات الخارجي: Connects to whatever URLs you navigate to via Chrome

استكشاف الأخطاء

الأخطاء الشائعة وحلولها

Chrome not found

The server uses nodriver which manages its own Chrome. Ensure Chrome is installed or let nodriver download it.

تحقق: which google-chrome || which chromium
Anti-bot detection still triggered

Try adding delays between actions, reduce concurrent requests, or use different browser profiles.

تحقق: Check the page for CAPTCHA or block messages
Element clone incomplete

Some elements use shadow DOM or iframe isolation. Use execute_cdp_command for low-level access.

تحقق: Inspect the element in DevTools to check for shadow roots

البدائل

stealth-browser-mcp مقابل البدائل

البديلمتى تستخدمهاالمقايضة
playwright MCPYou don't need anti-bot bypass and want standard browser automationStandard Playwright with no stealth features but broader community support

المزيد

الموارد

📖 اقرأ ملف README الرسمي على GitHub

🐙 تصفح القضايا المفتوحة

🔍 تصفح أكثر من 400 خادم MCP و Skills