← back to blog

Migrating profiles from one anti-detect browser to another safely

Migrating profiles from one anti-detect browser to another safely

At some point every operator hits the same wall: the anti-detect browser you started with no longer fits. maybe the pricing jumped, the team grew, support went dark, or you tested a competitor and liked what you saw. whatever the reason, you now have 40, 200, or 800 profiles sitting in one tool and you need them somewhere else without burning months of session history.

this guide is for operators who already have live profiles with real cookies and real proxy assignments. it covers the export-import workflow between the major tools, the fingerprint settings that actually transfer, and the steps that most people skip, which is usually why accounts die on arrival in the new browser.

by the end you will have a clean migration process you can repeat. nothing here requires writing complex code. a basic understanding of what cookies are and how browser fingerprints work is enough to follow along.


what you need

  • source browser with export capability: Multilogin 6 or MLX, GoLogin, AdsPower, Dolphin Anty, or Incogniton. most paid tiers support profile export; check your plan before starting.
  • destination browser installed and licensed: have at least one paid seat ready so you can test imports before committing the full batch.
  • cookie export tool: EditThisCookie (Chrome extension, free) or Cookie-Editor (Firefox/Chrome, free) as a fallback for manual grabs.
  • a spreadsheet: Google Sheets or Excel. you need a mapping table: old profile ID, account username, proxy assignment, new profile ID.
  • proxy list: if you are moving proxies too, have the full credential list exported from your proxy provider. residential proxies from providers like Brightdata or Smartproxy export as CSV from the dashboard.
  • time budget: allow 15-30 minutes per 100 profiles for the first batch. bulk tools can cut this, but not on the first run.
  • a test account per platform: do not migrate all profiles at once. run one account through the full cycle and log into the target platform before touching the rest.

estimated tooling cost if you are switching from GoLogin to AdsPower: GoLogin Team is $99/month, AdsPower Base is $9/month for 10 profiles scaling to $50/month for 100. the migration itself costs nothing except time.


step by step

step 1: freeze activity on source profiles

before touching any export, pause all running automations and close every active profile session. cookies written mid-session can be incomplete or in a locked state depending on the browser.

in Dolphin Anty you do this from the profile list: select all, right-click, stop. in GoLogin the sync button in the top bar will show pending writes, wait until it clears.

expected output: all profiles show “closed” or equivalent status in the source tool.

if it breaks: if a profile shows as running but the browser window is gone, force-close from your OS task manager targeting the browser subprocess, then re-check the profile list.

step 2: audit and tag your profiles

open your spreadsheet and export the profile list from the source tool. every major anti-detect browser has a CSV export somewhere in settings. in Multilogin MLX it is under Team > Profiles > Export. in AdsPower it is in the profile table, top-right export button.

the columns you need: profile ID, name, assigned proxy, tags, last active date. add a column: “migration priority” and mark which profiles have active logged-in sessions you care about. profiles that have never logged into anything can be recreated from scratch without a cookie transfer.

expected output: a spreadsheet with every profile catalogued and prioritised.

if it breaks: if the export CSV is empty or malformed, try exporting a smaller batch (10 profiles) first. some tools have row limits on bulk export.

step 3: export cookies from each priority profile

this is the step that separates clean migrations from burned accounts. the session cookies, specifically the auth tokens, are what keep you logged in. lose them and you are starting over with a fresh device fingerprint hitting a platform that remembers your old one.

option A: native export (preferred). AdsPower, Dolphin Anty, and Incogniton all have a right-click > export cookies option that produces a JSON file per profile. GoLogin exports cookies via the three-dot menu on each profile. the output is a Netscape-format or JSON cookie file depending on the tool.

option B: extension-based export. open the profile, install Cookie-Editor (available on Chrome Web Store and Firefox Add-ons, free), export as JSON. do this for each profile that matters.

store each cookie file named by profile ID: profile_12345_cookies.json. keep them in a folder that mirrors your spreadsheet.

/migration/
  cookies/
    profile_12345_cookies.json
    profile_12346_cookies.json
  mapping.csv

expected output: one cookie file per priority profile, named consistently.

if it breaks: if the cookie export is empty, the session may have already expired. log in manually once, then re-export immediately.

step 4: document fingerprint configurations

cookies alone are not enough. if you import a session into a profile with a different user agent, OS, or screen resolution than the platform last saw, you will get a security challenge or silent flag.

for each priority profile, record: browser type (Chrome/Firefox), browser version, OS, user agent string, screen resolution, timezone, language, and WebRTC settings. most tools show this in the profile edit screen.

you do not need to match every fingerprint parameter exactly, but user agent, OS, and timezone are the three that cause the most problems. a session from a Chrome 124 / Windows 11 / UTC+8 profile should land in a destination profile with the same three values.

the WebDriver specification from W3C explains how browser automation exposes these values, which is useful background if you want to understand why platforms check them.

expected output: fingerprint notes added to your mapping spreadsheet.

if it breaks: if the source tool does not show full fingerprint details, open the profile, navigate to chrome://version and screenshot it.

step 5: set up destination profiles with matching fingerprints

in the destination browser, create new profiles manually or via bulk import. if the tool supports CSV bulk creation (AdsPower and Multilogin both do), format your mapping spreadsheet columns to match their import template. this is faster than clicking through 200 forms.

when creating each destination profile, set the fingerprint parameters you recorded in step 4. do not use “random fingerprint” on profiles where you have live sessions, because random means different from what the platform last saw.

assign proxies at this stage. if your proxy credentials changed, update them in the spreadsheet before importing.

expected output: destination profiles created, named to match source, proxies assigned, fingerprints set to match the source profile’s values.

if it breaks: bulk import failures usually come from column format mismatches. check the destination tool’s import template against your CSV headers.

step 6: import cookies into destination profiles

open the destination profile. install Cookie-Editor if the tool does not have native cookie import. click “import”, paste or load the JSON file from step 3.

for Netscape-format files, Cookie-Editor handles the conversion automatically. for JSON files exported from one tool and imported into another, the field names usually match (name, value, domain, path, expires, httpOnly, secure). if they do not match, a one-line Python script can remap them:

import json

with open("profile_12345_cookies.json") as f:
    cookies = json.load(f)

# remap if source used "expirationDate" instead of "expires"
for c in cookies:
    if "expirationDate" in c:
        c["expires"] = c.pop("expirationDate")

with open("profile_12345_cookies_fixed.json", "w") as f:
    json.dump(cookies, f)

expected output: cookies imported, visible in Cookie-Editor’s list with correct domain and expiry values.

if it breaks: if cookies import but the session is invalid, check that the domain field matches exactly, including the leading dot (.example.com vs example.com).

step 7: test the session before decommissioning the source

open the destination profile, navigate to the platform, and confirm you are still logged in. check: account name visible, no security prompt, normal account state.

do this for every priority profile before you touch the source. if 10% of your profiles fail the test, you want to know that while the source profiles are still intact and you can re-export.

log pass/fail in your spreadsheet.

expected output: >90% of priority profiles pass the login test on the first attempt.

if it breaks: a security prompt usually means fingerprint mismatch. go back to step 5 and correct the user agent or timezone. do not click through the security challenge from the destination profile on a platform that matters.

step 8: migrate non-priority profiles

profiles with no active sessions are easier. create them in the destination tool with fresh fingerprints and assign proxies. no cookie transfer needed. use bulk creation here to save time.

expected output: all profiles exist in the destination tool.

step 9: decommission source profiles

once the migration is confirmed, cancel or downgrade the source tool subscription. do not delete source profiles until you have run the destination profiles for at least one full billing cycle and confirmed account health.


common pitfalls

importing cookies before setting the fingerprint. platforms store your device fingerprint alongside the session. if the cookie lands in a profile with a different OS or browser version, the session check fails silently and you get logged out on the next page load.

migrating expired sessions. check the expiry date on exported cookies before importing. a cookie with an expiry timestamp in the past will not work regardless of how cleanly you transfer it. the Chromium cookie handling documentation covers how session vs persistent cookies behave differently.

using the same proxy on two profiles simultaneously. during a parallel migration test, operators sometimes run the source and destination profile on the same proxy at the same time. some platforms flag two simultaneous sessions from one IP. stagger your tests.

skipping the audit step. migrating 500 profiles you have not reviewed means migrating 200 dead or duplicate profiles. the audit in step 2 typically cuts the real migration workload by 30-40%.

trusting “sync” over local backup. cloud-synced profiles in Multilogin or GoLogin are not the same as having a local cookie export. sync can fail, accounts can get suspended, and you lose access immediately. always export cookies to local files before cancelling a subscription.


scaling this

10-50 profiles: the manual workflow above works fine. one person, one afternoon.

50-500 profiles: write a small script around the destination tool’s API. AdsPower, GoLogin, and Multilogin all expose REST APIs for profile creation and update. the cookie import still requires opening each profile, but you can automate profile creation and fingerprint assignment. if you are running airdrop farming operations at this scale, the workflow at airdropfarming.org/blog/ has relevant parallel patterns for managing large profile sets.

500+ profiles: at this scale you need a dedicated migration window, a rollback plan, and ideally a second operator checking the test sample. consider migrating by platform cohort, all Twitter profiles one week, all Gmail profiles the next, so a bad batch does not cascade across your entire operation. the multiaccountops.com/blog/ covers team workflows and delegation patterns that apply here.

at 1000+ profiles the bottleneck is usually cookie import speed, since it requires an open browser window per profile. some teams write Selenium or Playwright scripts to automate the cookie-editor extension interaction. that is a separate project but worth planning for if you are above 500 profiles.


where to go next


Written by Xavier Fok

disclosure: this article may contain affiliate links. if you buy through them we may earn a commission at no extra cost to you. verdicts are independent of payouts. last reviewed by Xavier Fok on 2026-05-19.

need infra for this today?