A toolkit for testing browser automation engines against modern web protection systems. It checks how well each engine can bypass bot detection and measures their speed, resource usage, and resistance to fingerprinting.
Modern web applications use advanced bot detection like Cloudflare, DataDome, and Imperva to block automated access. This benchmark suite shows how different browser automation engines handle these defenses:
- Bypass Success Rate: Effectiveness against major protection systems
- Performance Metrics: Memory usage, CPU consumption, and page load times
- Fingerprinting Resistance: reCAPTCHA scores and CreepJS trust ratings
- Network Analysis: IP detection (proxy validation) and WebRTC leak testing
- Cloudflare
- DataDome
- Amazon
- Google Search
- Ticketmaster (Imperva)
- More systems coming soon
- Playwright - Microsoft's automation framework (Chrome, Firefox, Safari)
- Camoufox - Playwright-based
- Patchright - Playwright-based
- Playwright Stealth - Playwright-based
- Selenium - Open-source browser automation framework (apparently deprecated, so it is tested without proxies)
- NoDriver - Open-source browser automation framework (supports only SOCKS5 proxies)
- More engines coming soon. What engine should I add next?
- Automated report generation with visualizations
- Performance profiling and resource usage tracking
- Exportable results in JSON and Markdown formats
Using a clean proxy is essential for accurate benchmark results.
Why Proxies Are Required
- IP Reputation: Your home/datacenter IP may already be flagged by protection systems from previous automation attempts, browser extensions, or security software
- Clean Testing Environment: A fresh proxy IP ensures you're testing the browser engine's capabilities, not your IP's reputation
- Rate Limiting: Repeated tests from the same IP can trigger rate limiting, affecting bypass success rates
This benchmark provides detailed comparative analysis. Here's an excerpt from a recent test run (more in results/example):
Real IP in this example - 169.150.201.11
Proxy IP in this example is different for each engine
Engine | Bypass Rate (%) |
---|---|
nodriver-chrome | 100.0 |
camoufox | 83.3 |
camoufox_headless | 83.3 |
tf-playwright-stealth-firefox | 66.7 |
playwright-firefox | 50.0 |
patchright | 50.0 |
tf-playwright-stealth-chromium | 50.0 |
tf-playwright-stealth-firefox_headless | 50.0 |
playwright-chrome | 33.3 |
patchright_headless | 33.3 |
tf-playwright-stealth-chromium_headless | 33.3 |
playwright-chrome_headless | 33.3 |
nodriver-chrome_headless | 16.7 |
playwright-firefox_headless | 16.7 |
Engine | Memory Usage (MB) | CPU Usage (%) |
---|---|---|
playwright-chrome_headless | 209.0 | 5.2 |
tf-playwright-stealth-chromium_headless | 215.0 | 0.0 |
tf-playwright-stealth-chromium | 398.0 | 0.0 |
playwright-chrome | 405.0 | 0.0 |
nodriver-chrome_headless | 510.0 | 6.3 |
playwright-firefox_headless | 521.0 | 0.0 |
nodriver-chrome | 527.0 | 10.4 |
patchright_headless | 540.0 | 15.5 |
patchright | 573.0 | 5.2 |
playwright-firefox | 601.0 | 10.3 |
tf-playwright-stealth-firefox_headless | 737.0 | 5.1 |
tf-playwright-stealth-firefox | 900.0 | 10.3 |
camoufox | 1080.0 | 36.4 |
camoufox_headless | 1097.0 | 20.7 |
If the CPU usage is 0 - failed to measure or it really is 0 for CDP sessions. The problem is known and will be fixed.
Recaptcha Scores - https://recaptcha-demo.appspot.com/recaptcha-v3-request-scores.php
Engine | Recaptcha Score (0-1) |
---|---|
tf-playwright-stealth-chromium | 0.30 |
camoufox | 0.10 |
patchright | 0.10 |
camoufox_headless | 0.10 |
patchright_headless | 0.10 |
playwright-chrome | 0.10 |
playwright-firefox | 0.10 |
playwright-chrome_headless | 0.10 |
playwright-firefox_headless | 0.10 |
tf-playwright-stealth-chromium_headless | 0.10 |
tf-playwright-stealth-firefox | 0.10 |
tf-playwright-stealth-firefox_headless | 0.10 |
nodriver-chrome | nan |
nodriver-chrome_headless | nan |
This Score is taken by solving the reCAPTCHA v3 on your browser. The Score shows if Google considers you as HUMAN or BOT. 1.0 is very likely a good interaction, 0.0 is very likely a bot With low score values (< 0.3) you'll get a slow reCAPTCHA 2, it would be hard to solve it. And vise versa, with score >= 0.7 it will be much easier.
CreepJS Scores - https://abrahamjuliot.github.io/creepjs
Engine | Trust Score (%) | Bot Score (%) | WebRTC IP |
---|---|---|---|
patchright | 99.00 | 0.00 | 169.150.201.11 |
playwright-firefox_headless | 99.00 | 0.00 | 169.150.201.11 |
patchright_headless | 93.00 | 0.00 | 169.150.201.11 |
nodriver-chrome_headless | 93.00 | 0.00 | 169.150.201.11 |
playwright-firefox | 93.00 | 0.00 | 169.150.201.11 |
playwright-chrome_headless | 91.50 | 0.00 | 169.150.201.11 |
playwright-chrome | 84.00 | 0.00 | 169.150.201.11 |
nodriver-chrome | 69.00 | 13.00 | 169.150.201.11 |
camoufox_headless | 59.50 | 13.00 | 184.79.187.62 |
camoufox | 0.00 | 0.00 | |
tf-playwright-stealth-chromium | 0.00 | 25.00 | 169.150.201.11 |
tf-playwright-stealth-chromium_headless | 0.00 | 25.00 | 169.150.201.11 |
tf-playwright-stealth-firefox | 0.00 | 25.00 | 169.150.201.11 |
tf-playwright-stealth-firefox_headless | 0.00 | 25.00 | 169.150.201.11 |
Applicapable only with proxy. If the WebRTC IP is different from your real IP - no leakage
Engine | IP |
---|---|
camoufox | 62.136.33.120 |
camoufox_headless | 184.79.187.62 |
nodriver-chrome | 200.71.127.84 |
nodriver-chrome_headless | 196.17.170.160 |
patchright | 96.232.46.26 |
patchright_headless | 86.23.215.117 |
playwright-chrome | 184.77.209.35 |
playwright-chrome_headless | 184.77.78.176 |
playwright-firefox | 189.76.185.203 |
playwright-firefox_headless | 82.4.75.104 |
tf-playwright-stealth-chromium | 131.108.236.167 |
tf-playwright-stealth-chromium_headless | 184.79.64.193 |
tf-playwright-stealth-firefox | 86.176.4.29 |
tf-playwright-stealth-firefox_headless | 50.99.215.133 |
Applicapable only with proxy. If the IP is your proxy's IP - good, your real IP - bad.
-
Clone the repository
git clone https://github.com/techinz/browsers-benchmark.git cd browsers-benchmark
-
Set up Python environment
python -m venv venv source venv/bin/activate # On Windows: venv\Scripts\activate pip install -r requirements.txt
-
Install browser engines
Playwright
playwright install # On Linux also run: playwright install-deps
Camoufox
# Windows camoufox fetch # Linux python -m camoufox fetch sudo apt install -y libgtk-3-0 libx11-xcb1 libasound2
Patchright
patchright install chromium
-
Configure settings
cp .env.example .env # Edit .env with your proxy settings if needed
-
Configure proxies
- Create a file named
proxies.txt
in thedocuments
directory. - Add your proxy URLs in format
http://username:password@proxy_host:port
orhttp://proxy_host:port
.
βοΈ IMPORTANT (1): Number of proxies has to be not less than number of engines you want to test.
βοΈ IMPORTANT (2): Some engines support different proxy protocols - for example, Playwright supports only HTTP and HTTPS, but NoDriver supports only SOCKS5.
This implies that you have to add multiple proxy protocols to theproxies.txt
file or exclude some engines from the test.
At the moment you need all HTTP/HTTPS proxies and at least 1 SOCKS5 for NoDriver. Also, the benchmark will show you what proxy protocols are missing.
βοΈ IMPORTANT (3): Selenium won't use any proxies.
Example
proxies.txt
content (each line is a separate proxy):http://proxy1.example.com:8080 http://proxy2.example.com:8080 http://username:password@proxy3.example.com:8080 http://username:password@proxy4.example.com:8080 socks5://username:password@proxy5.example.com:8080
- Create a file named
-
Run benchmark
python main.py
# Proxy Configuration (highly recommended to enable)
PROXY_ENABLED=true
PROXY_FILE_PATH=documents/proxies.txt
PROXY_MAX_RETRIES=3
# Performance Settings
PAGE_LOAD_TIMEOUT_S=90
PAGE_STABILIZATION_DELAY_S=5
MAX_RETRIES=3
The benchmark generates reports in the results/
directory:
summary.md
- Human-readable markdown reportbenchmark_results_*.json
- Raw data for further analysismedia/
- Generated visualizations and screenshotsbypass_dashboard.png
- Multi-metric dashboardrecaptcha_scores.png
- reCAPTCHA performance chartcreepjs_scores.png
- Fingerprinting resistance analysisscreenshots
- Screenshots of all tested targets
The codebase follows a modular architecture for extensibility:
βββ config/ # Configuration management
βββ engines/ # Browser engine implementations
βββ utils/
β βββ targets/ # Test target definitions
β βββ report/ # Report generation system
β βββ logging/ # Structured logging
β βββ ...
βββ results/ # Output directory
-
Modify
config/benchmark_targets.py
to add custom test targets:Target( name="custom_site", url="https://example.com", check_function="check_custom_bypass", description="Custom site protection test" )
-
Create a check function for the target in
utils/targets/check_bypass
, for example in a file namedcustom_bypass.py
:from engines.base import BrowserEngine async def check_custom_bypass(engine: BrowserEngine) -> bool: element_found, element_html = await engine.locator('//div[@class="captcha"]') return not element_found # no captcha found - success!
-
Add it to the checkers mapping in
config/benchmark_targets.py
'sBypassTargetsSettings
:checkers: Dict[str, Callable] = Field( default_factory=lambda: { "check_cloudflare_bypass": check_cloudflare_bypass, "check_datadome_bypass": check_datadome_bypass, ... "check_custom_bypass": check_custom_bypass, } )
-
Extend the
BrowserEngine
base class:class CustomEngine(BrowserEngine): async def start(self) -> None: # Initialize browser async def navigate(self, url: str) -> Dict[str, Any]: # Navigation logic
Or, if Playwright-based, extend
PlaywrightBase
base class:class CustomPlaywrightBasedEngine(PlaywrightBase): ...
Or, if Selenium-based, extend
SeleniumBase
base class:class CustomSeleniumBasedEngine(SeleniumBase): ...
-
Add it to the engines mapping in
config/engines.py
'sEnginesSettings
:base_engines = [ { "class": PlaywrightEngine, "params": {"headless": True, "name": "playwright-chrome_headless", "browser_type": "chromium"} }, ... { "class": CustomEngine, "params": {"headless": True, "name": "custom_engine", "browser_type": "chromium"} } ]
Common Issues:
- Detection failures: Verify proxy configuration and target accessibility
Contributions are welcome! Areas where help is needed:
- New Protection Systems: Add support for additional bot detection services
- Browser Engines: Implement support for new automation frameworks (e.g. Selenium-based)
- Analysis Tools: Enhance reporting and visualization
This project is licensed under the MIT License - see the LICENSE file for details.
This tool is designed for educational and research purposes. Users are responsible for ensuring compliance with website terms of service and applicable laws. The authors and contributors do not encourage or endorse any malicious use of this software.