github xpipe-io/xpipe 11.3

5 days ago

Changes

  • You can now set shell environments as a default login environment for a system
  • You can now instantly open an existing script in a text editor by clicking on it
  • There are now context menu actions to open a specific proxmox VM/container in the dashboard
  • You can now toggle to show only running systems for Proxmox and VMware
  • Fix PowerShell encoding issues on some Windows systems
  • Fix kubectl versions not being displayed for newer clients
  • Fix issue with zsh loading, causing potential freezing issues with zsh extensions
  • Fix application not starting up when PATH was corrupted on Windows
  • Fix shell environments running init script twice
  • Fix cmd shell environments not displaying a version
  • Fix window close freezing for a short time
  • Fix proxmox pvesh issue

News

The XPipe python API has now been designated the official API library to interact with XPipe. If you ever thought about programmatically interacting with systems through XPipe, feel free to check it out.

The website now contains a few new documents to maybe help you to convince your boss when you're thinking about deploying XPipe at your workplace. There is the executive summary for a short overview of XPipe and the security whitepaper for CISOs.

Downloads

Installers

Installers are the easiest way to get started and they come with an automatic updater functionality. They can also be used to upgrade an existing installation to a newer version. The following installers are available:

Portable

If you don't like installers, you can also use portable versions that are packaged as an archive. The following portable versions are available:

Install Script

Install XPipe by pasting the installation command into your terminal. This will perform the full setup automatically.

Windows
powershell -ExecutionPolicy Bypass -Command iwr "https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.ps1" -OutFile "$env:TEMP\get-xpipe.ps1" ";"  "&" "$env:TEMP\get-xpipe.ps1" -XPipeVersion "11.3"
Bash Script (Linux / MacOS)
bash <(curl -sL https://raw.githubusercontent.com/xpipe-io/xpipe/master/get-xpipe.sh) -v 11.3

VirusTotal Analysis

Automated VirusTotal analysis of all artifacts:

Signatures

All artifacts are signed with the following gpg key: https://xpipe.io/signatures/crschnick.gpg

Banner

Don't miss a new xpipe release

NewReleases is sending notifications on new releases.