A comprehensive suite of tools designed to make SSH connections effortless, secure, and productive.
Store, organize, and manage all your SSH connections in one secure place.
Full-featured terminal emulation with multi-session support.
Browse and manage files on your remote servers with ease.
Upload, download, and transfer files with real-time progress tracking.
Edit remote files directly in the app with syntax support for 50+ file types.
Create and manage local, remote, and dynamic port forwarding with ease.
Share SSH connection profiles securely with other devices.
All your credentials are encrypted and protected by a master password.
Personalize your terminal with fonts, colors, and themes.
Built-in log viewer for troubleshooting and monitoring application activity.
Enterprise-grade security features to keep your credentials and connections safe.
All credentials are encrypted at rest using industry-standard encryption algorithms.
Your vault is protected by a master password that only you know.
All peer-to-peer transfers are encrypted end-to-end for secure sharing.
All data is stored locally on your device — nothing is sent to external servers.
Create encrypted backups of your vault and restore them when needed.
Experience a full-featured terminal with xterm.js at its core. Support for ANSI colors, special characters, and all the features you expect from a modern terminal emulator.
Browse, edit, and transfer files on remote servers as easily as on your local machine. Support for 50+ file types with syntax highlighting and direct editing capabilities.
Create local and remote port forwarding tunnels with just a few clicks. Monitor tunnel status in real-time and configure auto-start for your most-used tunnels.
Support for over 50 file types including code, config, and markup files.
Learn how to set up your first SSH connection and start using Swavan SSH Studio.
When you first launch the app, you'll be prompted to create a master password. This password encrypts all your credentials.
Click "New Connection" in the sidebar and fill in your server details:
Click on your saved connection to open a terminal session. You can open multiple sessions by clicking the connection again.
Learn how to securely access remote services through SSH tunnels.
SSH tunneling (port forwarding) creates an encrypted connection between your local machine and a remote server, allowing you to securely access services that aren't directly exposed to the internet.
Forward a port from your local machine to a service on the remote server or its network.
Local Port 5433 → Remote Host:5432
Forward a port from the remote server back to a service on your local machine.
Remote Port 8080 → localhost:3000
Go to the Tunnels section in the sidebar, or click the tunnel icon on a connection card.
Click "Add Tunnel" and configure your tunnel:
Click the Start button to activate the tunnel. The status indicator will turn green when active.
Connect to your local port as if the remote service was running locally:
# Example: Connect to PostgreSQL through tunnel
psql -h localhost -p 5433 -U myuser -d mydb
# Example: Access Redis through tunnel
redis-cli -h localhost -p 6380
Let's say you have a PostgreSQL database running on your server at port 5432, but it's not exposed to the internet for security reasons.
5433 → Remote localhost:5432
psql -h localhost -p 5433 -U postgres
Securely share your SSH configurations with teammates or across devices.
Master the SSH terminal for efficient remote server management.
Click on any saved connection to open a new terminal session. The connection will be established automatically.
Open multiple sessions by clicking the same or different connections. Each session opens in a new tab.
Personalize your terminal in Settings → Terminal Preferences:
Click the X on the session tab or use the disconnect button. Running processes will be terminated.
tmux or screen to keep processes running after disconnect.
Browse, transfer, and edit files on remote servers.
Click the Explorer icon in the sidebar while connected to a server, or click the folder icon on a connection card.
Click folders to navigate, use the breadcrumb path, or click the home icon to go to your home directory.
Upload and download files with real-time progress tracking:
Click the upload button and select local files to transfer to the server.
Right-click a file and select "Download" to save it locally.
Double-click any text file (up to 5MB) to open it in the built-in editor. Changes save directly to the server.
Right-click on files or folders for additional options:
Install and run Swavan SSH Studio on Linux using AppImage.
Download the latest .AppImage file from the GitHub Releases page. Choose x86_64 or aarch64 based on your CPU architecture.
uname -m in a terminal to check.
Open a terminal and run:
chmod +x swavan-ssh-studio_*.AppImage
AppImages require FUSE. Install it if you get errors when running the AppImage:
# Ubuntu 24.04+ / Debian (newer)
sudo apt install libfuse2t64
# Ubuntu 22.04 / Debian (older)
sudo apt install libfuse2
# Fedora
sudo dnf install fuse-libs
# Arch Linux
sudo pacman -S fuse2
Double-click the AppImage file or run it from the terminal:
./swavan-ssh-studio_*.AppImage
NixOS requires special configuration to run AppImages. Add this to your NixOS configuration:
# In your configuration.nix
programs.appimage.enable = true;
programs.appimage.binfmt = true;
Then rebuild:
sudo nixos-rebuild switch
nix-shell -p appimage-run --run "appimage-run ./swavan-ssh-studio_*.AppImage" without modifying your configuration.
Configure Windows Firewall to enable peer-to-peer connection sharing.
P2P sharing uses mDNS (UDP port 5353) for peer discovery and QUIC protocol for encrypted data transfer. Windows Firewall blocks these by default for apps without explicit exceptions. If P2P sharing is enabled but no peers are discovered, firewall rules are likely the cause.
Right-click the Start menu and select "Windows Terminal (Admin)" or "PowerShell (Admin)".
Allow mDNS traffic for peer discovery:
New-NetFirewallRule -DisplayName "Swavan SSH Studio mDNS" `
-Direction Inbound -Protocol UDP `
-LocalPort 5353 -Action Allow
Allow QUIC protocol traffic for encrypted data transfer:
New-NetFirewallRule -DisplayName "Swavan SSH Studio QUIC" `
-Direction Inbound -Protocol UDP `
-LocalPort 1024-65535 -Action Allow `
-Program "C:\Program Files\Swavan SSH Studio\swavan-ssh-studio.exe"
After adding the firewall rules:
If you no longer need P2P sharing, remove the firewall rules:
Remove-NetFirewallRule -DisplayName "Swavan SSH Studio mDNS"
Remove-NetFirewallRule -DisplayName "Swavan SSH Studio QUIC"
Get the most out of Swavan SSH Studio with these power-user tips.
Create a tunnel to access PostgreSQL, MySQL, or Redis running on your server from local database tools like DBeaver or TablePlus.
Tunnel: localhost:5433 → server:5432
Connect: psql -h localhost -p 5433
Access internal web dashboards, admin panels, or APIs that are only available on the server's localhost.
Tunnel: localhost:8080 → server:3000
Open: http://localhost:8080
Connect to Grafana, Prometheus, or other monitoring tools running on internal ports.
Tunnel: localhost:3001 → server:3000
Access Grafana at localhost:3001
Expose your local dev server to a remote machine for testing webhooks or mobile app development.
Remote Tunnel: server:8080 → localhost:3000
Access your local app from server