Your entire server infrastructure at your fingertips
Installers are the easiest way to get started and they come with an automatic updater functionality. They can also be used to upgrade an existing installation to a newer version. The following installers are available:
If you don't like installers, you can also use portable versions that are packaged as an archive. The following portable versions are available:
Install XPipe by pasting the installation command into your terminal. This will perform the full setup automatically.
powershell -ExecutionPolicy Bypass -Command iwr "https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.ps1" -OutFile "$env:TEMP\get-xpipe.ps1" ";" "&" "$env:TEMP\get-xpipe.ps1" -XPipeVersion "9.3"
bash <(curl -sL https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.sh) -v 9.3
Automated VirusTotal analysis of all artifacts:
All artifacts are signed with the following gpg key: https://xpipe.io/signatures/crschnick.gpg
The file browser has been reworked to support many new keyboard shortcuts, plus the general user experience has been improved:
The git error actions have been reworked. In case any merge conflict or similar occurs, the possible actions are now handled better:
Installers are the easiest way to get started and they come with an automatic updater functionality. They can also be used to upgrade an existing installation to a newer version. The following installers are available:
If you don't like installers, you can also use portable versions that are packaged as an archive. The following portable versions are available:
Install XPipe by pasting the installation command into your terminal. This will perform the full setup automatically.
powershell -ExecutionPolicy Bypass -Command iwr "https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.ps1" -OutFile "$env:TEMP\get-xpipe.ps1" ";" "&" "$env:TEMP\get-xpipe.ps1" -XPipeVersion "9.2"
bash <(curl -sL https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.sh) -v 9.2
Automated VirusTotal analysis of all artifacts:
All artifacts are signed with the following gpg key: https://xpipe.io/signatures/crschnick.gpg
Installers are the easiest way to get started and they come with an automatic updater functionality. They can also be used to upgrade an existing installation to a newer version. The following installers are available:
If you don't like installers, you can also use portable versions that are packaged as an archive. The following portable versions are available:
Install XPipe by pasting the installation command into your terminal. This will perform the full setup automatically.
powershell -ExecutionPolicy Bypass -Command iwr "https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.ps1" -OutFile "$env:TEMP\get-xpipe.ps1" ";" "&" "$env:TEMP\get-xpipe.ps1" -XPipeVersion "9.1"
bash <(curl -sL https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.sh) -v 9.1
Automated VirusTotal analysis of all artifacts:
All artifacts are signed with the following gpg key: https://xpipe.io/signatures/crschnick.gpg
XPipe now comes with support for remote desktop connections. VNC connections are fully handled over SSH and can therefore be established on top of any existing SSH connection you have in XPipe. RDP support is realized similar to the terminal support, i.e. by launching your preferred RDP client with the connection information. X11-forwarding for SSH is also now supported.
With support for remote graphical desktop connection methods as well now in XPipe 9, the big picture idea is to implement the concept of coherent desktops. Essentially, you can launch predefined desktop applications, terminals, and scripts on any remote desktop connection, regardless of the underlying connection implementation. In combination with the improved SSH tunnel and background session support, you can launch graphical remote applications with one click in the same unified way for VNC over SSH connections, RDP connections, and X11-forwarded SSH connections.
The general implementation and concept will be refined over the next updates.
Tunneled and X11-forwarded custom SSH connections are now properly detected and can be toggled on and off to run in the background as normal tunnels. This applies to normal connections and also SSH configs
The connection establishment has been reworked to reduce the amount of double prompts, e.g. for smartcards or 2FA, where user input is required twice.
The custom SSH connections now properly apply all configuration options of your user configuration file. They also now correctly apply multiple options for the same key correctly.
Any value specified for the RemoteCommand
config option will now be properly applied when launching a terminal. This allows you to still use your preexisting init command setup, e.g. with tmux.
There is now support defining multiple host entries in place in a custom SSH connection. This is useful for cases where you want to use ProxyJump hosts in place without having to define them elsewhere.
A host key acceptance notification is now displayed properly in case your system doesn't automatically accept new host keys
There's now an option to not let XPipe interact with the system. In case a system that does not run a known command shell, e.g. a router, link, or some IOT device, XPipe was previously unable to detect the shell type and errored out after some time. This option fixes this problem. This feature is available in the professional edition preview for two weeks.
You can now enable X11 forwarding for an SSH connection.
XPipe allows you to use the WSL2 X11 capabilities on Windows for your SSH connection. The only thing you need for this is a WSL2 distribution installed on your local system. XPipe it will automatically choose a compatible installed distribution if possible, but you can also use another one in the settings menu.
This means that you don't need to install a separate X11 server on Windows. However, if you are using one anyway, XPipe will detect that and use the currently running X11 server.
XPipe 9 now comes with translations for the user interface. These were initially generated with DeepL and can be easily improved and corrected by anyone on GitHub. You can check them out in action and if there is any translation you don't like, submit a quick pull request to fix it. For instructions on how to do this, see https://github.com/xpipe-io/xpipe/tree/master/lang.
The terminal integrations have been reworked across the board. To better show which terminals are well supported and which aren't, there is now a status indicator for every available terminal. This will show you how good the XPipe integration with each one is and which terminals are recommended to be used with XPipe.
The kitty terminal is now fully supported with tabs on both Linux and macOS. The Warp terminal integration now correctly enables all Warp features on remote shells. On macOS, other third-party prompts also now work properly in the launched terminals.
The password manager handling has been improved and some potential sources of errors and confusion have been eliminated. There are also now a few command templates available for established password managers to quickly get started.
It is a goal to be able to use XPipe only with a keyboard either for productivity or for accessibility reasons. XPipe 9 introduces improved keyboard support with new shortcuts and improved focus control for navigating with the arrow keys, tab, space, and enter.
The application logo has been improved with of regards to contrast and visibility, which often was a problem on dark backgrounds. It should now stand out on any background color.
There have been countless small bug fixes across the board. They are not listed individually here, but hopefully you will notice some of them.
Installers are the easiest way to get started and they come with an automatic updater functionality. They can also be used to upgrade an existing installation to a newer version. The following installers are available:
If you don't like installers, you can also use portable versions that are packaged as an archive. The following portable versions are available:
Install XPipe by pasting the installation command into your terminal. This will perform the full setup automatically.
powershell -ExecutionPolicy Bypass -Command iwr "https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.ps1" -OutFile "$env:TEMP\get-xpipe.ps1" ";" "&" "$env:TEMP\get-xpipe.ps1" -XPipeVersion "9.0.1"
bash <(curl -sL https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.sh) -v 9.0.1
Automated VirusTotal analysis of all artifacts:
All artifacts are signed with the following gpg key: https://xpipe.io/signatures/crschnick.gpg
XPipe now comes with support for remote desktop connections. VNC connections are fully handled over SSH and can therefore be established on top of any existing SSH connection you have in XPipe. RDP support is realized similar to the terminal support, i.e. by launching your preferred RDP client with the connection information. X11-forwarding for SSH is also now supported.
With support for remote graphical desktop connection methods as well now in XPipe 9, the big picture idea is to implement the concept of coherent desktops. Essentially, you can launch predefined desktop applications, terminals, and scripts on any remote desktop connection, regardless of the underlying connection implementation. In combination with the improved SSH tunnel and background session support, you can launch graphical remote applications with one click in the same unified way for VNC over SSH connections, RDP connections, and X11-forwarded SSH connections.
The general implementation and concept will be refined over the next updates.
Tunneled and X11-forwarded custom SSH connections are now properly detected and can be toggled on and off to run in the background as normal tunnels. This applies to normal connections and also SSH configs
The connection establishment has been reworked to reduce the amount of double prompts, e.g. for smartcards or 2FA, where user input is required twice.
The custom SSH connections now properly apply all configuration options of your user configuration file. They also now correctly apply multiple options for the same key correctly.
Any value specified for the RemoteCommand
config option will now be properly applied when launching a terminal. This allows you to still use your preexisting init command setup, e.g. with tmux.
There is now support defining multiple host entries in place in a custom SSH connection. This is useful for cases where you want to use ProxyJump hosts in place without having to define them elsewhere.
A host key acceptance notification is now displayed properly in case your system doesn't automatically accept new host keys
There's now an option to not let XPipe interact with the system. In case a system that does not run a known command shell, e.g. a router, link, or some IOT device, XPipe was previously unable to detect the shell type and errored out after some time. This option fixes this problem. This feature is available in the professional edition preview for two weeks.
You can now enable X11 forwarding for an SSH connection.
XPipe allows you to use the WSL2 X11 capabilities on Windows for your SSH connection. The only thing you need for this is a WSL2 distribution installed on your local system. XPipe it will automatically choose a compatible installed distribution if possible, but you can also use another one in the settings menu.
This means that you don't need to install a separate X11 server on Windows. However, if you are using one anyway, XPipe will detect that and use the currently running X11 server.
XPipe 9 now comes with translations for the user interface. These were initially generated with DeepL and can be easily improved and corrected by anyone on GitHub. You can check them out in action and if there is any translation you don't like, submit a quick pull request to fix it. For instructions on how to do this, see https://github.com/xpipe-io/xpipe/tree/master/lang.
The terminal integrations have been reworked across the board. To better show which terminals are well supported and which aren't, there is now a status indicator for every available terminal. This will show you how good the XPipe integration with each one is and which terminals are recommended to be used with XPipe.
The kitty terminal is now fully supported with tabs on both Linux and macOS. The Warp terminal integration now correctly enables all Warp features on remote shells. On macOS, other third-party prompts also now work properly in the launched terminals.
The password manager handling has been improved and some potential sources of errors and confusion have been eliminated. There are also now a few command templates available for established password managers to quickly get started.
It is a goal to be able to use XPipe only with a keyboard either for productivity or for accessibility reasons. XPipe 9 introduces improved keyboard support with new shortcuts and improved focus control for navigating with the arrow keys, tab, space, and enter.
The application logo has been improved with of regards to contrast and visibility, which often was a problem on dark backgrounds. It should now stand out on any background color.
There have been countless small bug fixes across the board. They are not listed individually here, but hopefully you will notice some of them.
Installers are the easiest way to get started and they come with an automatic updater functionality. They can also be used to upgrade an existing installation to a newer version. The following installers are available:
If you don't like installers, you can also use portable versions that are packaged as an archive. The following portable versions are available:
Install XPipe by pasting the installation command into your terminal. This will perform the full setup automatically.
powershell -ExecutionPolicy Bypass -Command iwr "https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.ps1" -OutFile "$env:TEMP\get-xpipe.ps1" ";" "&" "$env:TEMP\get-xpipe.ps1" -XPipeVersion "9.0"
bash <(curl -sL https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.sh) -v 9.0
Automated VirusTotal analysis of all artifacts:
All artifacts are signed with the following gpg key: https://xpipe.io/signatures/crschnick.gpg
There is now the possibility to use XPipe professional for free for students and faculty from accredited educational institutions (high schools, colleges, and universities). Just send an email to [email protected] with your official email address of your educational institution.
Installers are the easiest way to get started and they come with an automatic updater functionality. They can also be used to upgrade an existing installation to a newer version. The following installers are available:
If you don't like installers, you can also use portable versions that are packaged as an archive. The following portable versions are available:
Install XPipe by pasting the installation command into your terminal. This will perform the full setup automatically.
powershell -ExecutionPolicy Bypass -Command iwr "https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.ps1" -OutFile "$env:TEMP\get-xpipe.ps1" ";" "&" "$env:TEMP\get-xpipe.ps1" -XPipeVersion "8.6"
bash <(curl -sL https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.sh) -v 8.6
Automated VirusTotal analysis of all artifacts:
There was some feedback that the available plans for the professional edition were confusing. The monthly subscription and one time purchase could easily be confused as basically the same thing with a different timespan. Even the FAQ could still not eliminate all points of confusion as most readers were already familiar with plans from other tools, so it was difficult to properly break up the terms.
While the monthly subscription did serve well as a cheap trial of some sorts, the community edition does almost the same job as most functionality is also available in there for noncommercial systems. Most people were also wary of subscriptions and interpreted the one-time purchase option as just a longer subscription even though that is not the case. There were also several other problems such as payment limitations with the subscription and no easy way to convert an existing subscription into the one-time purchase.
With this update, the monthly subscription will be retired. This makes it much easier to explain what you will get when purchasing the professional edition without having to differentiate between two completely different models. If you are currently using the monthly subscription, nothing will change for you. It will just not be possible for new customers to purchase it anymore.
The website at https://xpipe.io has also been updated with the updated professional edition structure and will now hopefully explain everything better.
There's also now a lifetime professional edition available, which will include all future pro features. You can find the details for that on the pricing page in the FAQ if you are interested.
sh
shells with Bad substitution
Installers are the easiest way to get started and they come with an automatic updater functionality. They can also be used to upgrade an existing installation to a newer version. The following installers are available:
If you don't like installers, you can also use portable versions that are packaged as an archive. The following portable versions are available:
Install XPipe by pasting the installation command into your terminal. This will perform the full setup automatically.
powershell -ExecutionPolicy Bypass -Command iwr "https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.ps1" -OutFile "$env:TEMP\get-xpipe.ps1" ";" "&" "$env:TEMP\get-xpipe.ps1" -XPipeVersion "8.5"
bash <(curl -sL https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.sh) -v 8.5
Automated VirusTotal analysis of all artifacts:
This update will restore the old behavior of sudo passwords being automatically sourced from connection details when possible, e.g. an SSH login password or a set WSL password. This behavior can also be combined with the option to always confirm elevation access in the security settings if you don't want XPipe to automatically fill in your sudo password.
Installers are the easiest way to get started and they come with an automatic updater functionality. They can also be used to upgrade an existing installation to a newer version. The following installers are available:
If you don't like installers, you can also use portable versions that are packaged as an archive. The following portable versions are available:
Install XPipe by pasting the installation command into your terminal. This will perform the full setup automatically.
powershell -ExecutionPolicy Bypass -Command iwr "https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.ps1" -OutFile "$env:TEMP\get-xpipe.ps1" ";" "&" "$env:TEMP\get-xpipe.ps1" -XPipeVersion "8.4"
bash <(curl -sL https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.sh) -v 8.4
Automated VirusTotal analysis of all artifacts:
xpipe-io.xpipe
Installers are the easiest way to get started and they come with an automatic updater functionality. They can also be used to upgrade an existing installation to a newer version. The following installers are available:
If you don't like installers, you can also use portable versions that are packaged as an archive. The following portable versions are available:
Install XPipe by pasting the installation command into your terminal. This will perform the full setup automatically.
powershell -ExecutionPolicy Bypass -Command iwr "https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.ps1" -OutFile "$env:TEMP\get-xpipe.ps1" ";" "&" "$env:TEMP\get-xpipe.ps1" -XPipeVersion "8.3"
bash <(curl -sL https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.sh) -v 8.3
Automated VirusTotal analysis of all artifacts:
One common feedback that some users shared was that it could be quite cumbersome to access a specific nested connection as one would have to possibly expand several connections first. Expanded connections would then also take up a lot of space, leading to a lot of scrolling.
There is now a quick access button available for connections that enables you to quickly choose a connection in the hierarchy without having to expand any connection views.
Installers are the easiest way to get started and they come with an automatic updater functionality. They can also be used to upgrade an existing installation to a newer version. The following installers are available:
If you don't like installers, you can also use portable versions that are packaged as an archive. The following portable versions are available:
Install XPipe by pasting the installation command into your terminal. This will perform the full setup automatically.
powershell -ExecutionPolicy Bypass -Command iwr "https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.ps1" -OutFile "$env:TEMP\get-xpipe.ps1" ";" "&" "$env:TEMP\get-xpipe.ps1" -XPipeVersion "8.2"
bash <(curl -sL https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.sh) -v 8.2
Automated VirusTotal analysis of all artifacts: