Open Source Browser Automation

Undetectable Chrome
for AI Agents

Run isolated, stealth browsers in Docker. REST API & MCP integration for AI agents. VNC debugging. Proxy rotation. Scale to 100+ instances.

Three ways to automate

REST API, MCP for AI agents, or direct Python. Pick your interface.

# Create an undetectable browser
curl -X POST http://localhost:18080/api/v1/browser/create_browser \
  -H "Content-Type: application/json" \
  -d '{"proxy": "http://user:pass@proxy:8080"}'

# Navigate to a URL
curl -X POST http://localhost:18080/api/v1/browser/{browser_id}/navigate \
  -H "Content-Type: application/json" \
  -d '{"url": "https://example.com"}'

# Take a screenshot
curl -X POST http://localhost:18080/api/v1/browser/{browser_id}/screenshot

Built for serious automation

Everything you need to run undetectable browsers at scale.

🎭

Undetected Chrome

Built on SeleniumBase UC to bypass Cloudflare, PerimeterX, and other anti-bot systems.

🔄

100+ Concurrent Browsers

Manage massive browser pools with automatic cleanup, health checks, and resource limits.

🌐

Proxy Rotation

Assign different proxies per browser instance. Support for HTTP, HTTPS, and SOCKS5.

🤖

MCP Integration

Native Model Context Protocol support for seamless AI agent integration.

🔍

VNC Debugging

Watch browsers in real-time via noVNC. Debug visually, not blindly.

🐳

Docker Native

One command deployment. Isolated, reproducible, and production-ready.

How it works

🚀

Your Application

TypeScript Python AI Agents

Airbrowser

REST /api/v1 MCP /mcp VNC /vnc
🌐

Browser Pool

Chrome 1 Chrome 2 Chrome N

Up and running in 60 seconds

bash — airbrowser
1
Docker (one-liner)
Fastest way to get started
$ docker run -d -p 18080:18080 --name airbrowser \
     ghcr.io/ifokeev/airbrowser-mcp:latest
Or download portable for Linux/macOS/Windows
2
Create Browser
Spawn an undetectable browser instance
$ curl -X POST localhost:18080/api/v1/browser/create_browser

# Response: {"browser_id": "a64e1c83-8fcc-..."}
3
Automate
Navigate, click, type—full browser control
$ curl -X POST localhost:18080/api/v1/browser/{id}/navigate \
     -d '{"url": "https://example.com"}'

# Browser navigates to the URL

Ready to automate?

Star us on GitHub and start building with undetectable browsers.