Pota Browser is an experimental, open-source profile manager for Chromium-based browsers, written in Rust. It enables advanced control over browser profiles and proxy routing, with a focus on privacy, automation, and anti-detection techniques.
I’m actively developing Pota Browser, and there’s still a lot to do. If you’re curious, feel free to check out the repo, test it out, and let me know what you think. Bug reports, feature ideas, and contributions are more than welcome!! 🙌
- Chromium based browser
- Rust
- Clone the repository:
git clone https://github.com/snaberino/pota-browser.git
- Navigate to the cloned folder:
cd pota-browser
- Run the project:
cargo run
- Manage multiple isolated Chromium profiles
- Custom profile paths per instance
- Support for custom Chromium installations
- Built-in proxy routing with local proxy client
- HTTP/SOCKS proxy support
- Proxy manager
Pota implements a proxy chain: it spins up a local proxy client that connects to a remote proxy, and then launches Chromium to connect to the local endpoint (e.g. 127.0.0.1:PORT
).
This provides:
- Better control over proxy behavior
- Support for authenticated proxies
- Decoupled browser ↔ proxy logic
- Socks proxy support
- WebRTC fake spoofing (correctly spoof host & STUN IP)
- Spoofing all
navigator
properties (device, OS, hardware, browser, etc.) - Screen size, resolution, window, and viewport property spoofing
- Many other things
For a complete anti-detect browser experience, it's not enough to just tweak launch flags or DevTools overrides. You really need to patch Chromium’s C++ source code to deeply spoof canvas, WebGL, audio, and more.
That’s out of scope for this project for now — but if you’re comfortable diving into Chromium’s internals and love hacking on C++... help is very welcome! 😄