The Universal
Cloud Terminal

Manage Azure, GCP, AWS, Hetzner, and Vultr servers from a single, blazing-fast TUI. Rent, manage, and SSH in seconds.

Shareware-era simple: distribute, trial, license, own.

curl -fsSL https://cloudmasters.browserbox.io/install.sh | bash
CloudMasters Dashboard

Install your way

macOS (.pkg), Windows (.exe), Linux (.tar.gz), or the curl/bash installer.

macOS Package

Signed .pkg installer for quick setup and clean updates.

Download latest

Windows Installer

Use the GUI installer or PowerShell to bootstrap fast.

irm https://cloudmasters.browserbox.io/install.ps1 | iex

Linux Tarball

Grab the latest build for your distro and drop it in your PATH.

Get Linux build

curl / bash

One-liner installer for quick starts and headless boxes.

curl -fsSL https://cloudmasters.browserbox.io/install.sh | bash

Why CloudMasters?

☁️

Multi-Cloud Native

Wraps official CLIs (az, gcloud, hcloud, aws) for stable, authenticated access without managing new secrets.

⚑

Blazing Fast TUI

Built with tview and Go. Keyboard-driven navigation, instant search, and real-time status updates.

πŸ’°

Smart Market

Compare prices across providers instantly. Sort by CPU, RAM, and price to find the best deal for your workload.

πŸ”

Secure & Local

Zero telemetry by default. Your credentials stay on your machine. Direct SSH access with automatic key management.

🌍

Geo Clustering

Servers grouped by 15 canonical cities worldwide. No more guessing which "us-east" is which.

πŸš€

One-Click Launch

Launch Docker, NGINX, or VNC desktops with pre-configured cloud-init scripts and firewall rules.

Trust without the fine print anxiety

We built CloudMasters for people who have been burned by surveillance software. Your data and IP are yours, forever.

Your cloud data stays yours

We never claim ownership of your infrastructure, configs, or code. What you build stays yours, period.

No credential exfiltration

CloudMasters sits on top of official CLIs. We don’t receive or store your cloud credentials.

Audit-friendly activity logs

Activity logs are designed for security and support, not surveillance. They avoid secrets and focus on timestamps and actions.

Ready to take control?

Try it free, license when it pays for itself, and keep your workflows forever.

Follow the release feed