Stealth Browser
Custom Chromium build with military-grade anti-detection
Custom Chromium Build
Hellcat uses a custom Chromium build with patches to evade bot detection systems like Cloudflare, PerimeterX, DataDome, Akamai, and Kasada.
Anti-Detection Patches
Modifies cipher suites, TLS extensions, and ALPN negotiation to match target profiles
Customizes SETTINGS frames, window updates, and priority frames
HTTP/3 fingerprint matching for modern protocols
WebGL, Canvas, and Navigator spoofing injected at runtime
Fingerprint Profiles
Browser fingerprints can be customized to match specific browsers and platforms:
{
"chrome-131-windows": {
"tls_version": "1.3",
"tls_ciphers": ["TLS_AES_128_GCM_SHA256", ...],
"http2_settings": {
"HEADER_TABLE_SIZE": 65536,
"MAX_CONCURRENT_STREAMS": 1000,
...
},
"user_agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64)...",
"webgl_vendor": "Google Inc. (NVIDIA)",
"canvas_noise": true
}
}Anti-Detection Features
TLS Fingerprinting
- • Cipher suites order matching
- • TLS extension customization
- • ALPN negotiation patterns
- • Session ticket handling
WebGL Spoofing
- • Vendor string customization
- • Renderer string matching
- • WebGL parameter consistency
Canvas Fingerprinting Protection
- • Imperceptible noise injection
- • Randomized per-session
- • Defeats canvas fingerprinting
Navigator Properties
- • Plugins and MimeTypes spoofing
- • Platform and language matching
- • Consistent property values
Testing Your Fingerprint
Verify browser fingerprint consistency with these tools:
- • browserleaks.com
- • browserscan.net
- • fingerprintjs.com/demo
Usage in Workflows
The stealth browser is used automatically in all browser automation workflows. You don't need to configure anything—just run your workflow and Hellcat handles the rest.
🛡️ Military-Grade Stealth
Hellcat's custom Chromium build is designed to be undetectable by modern bot protection systems. The combination of TLS, HTTP/2, QUIC fingerprinting, and runtime spoofing provides comprehensive protection.