Terminus : A Terminal For A More Modern Age

Terminus is a highly configurable terminal for a more modern age emulator for Windows, macOS and Linux.

  • Theming and color schemes
  • Fully configurable shortcuts
  • Split panes
  • Remembers your tabs
  • PowerShell (and PS Core), WSL, Git-Bash, Cygwin, Cmder and CMD support
  • Integrated SSH client and connection manager
  • Full Unicode support including double-width characters
  • Doesn’t choke on fast-flowing outputs
  • Proper shell experience on Windows including tab completion (via Clink)

Also Read – Bonesi : Tool For DDoS Botnet Simulator

  1. It is an alternative to Windows’ standard terminal (conhost), PowerShell ISE, PuTTY or iTerm
  2. It is not a new shell or a MinGW or Cygwin replacement. Neither is it lightweight – if RAM usage is of importance, consider Conemu or Alacritty

Plugins

Plugins and themes can be installed directly from the Settings view inside Terminus.

  • clickable-links – makes paths and URLs in the terminal clickable
  • shell-selector – a quick shell selector pane
  • title-control – allows modifying the title of the terminal tabs by providing a prefix, suffix, and/or strings to be removed
  • quick-cmds – quickly send commands to one or all terminal tabs
  • save-output – record terminal output into a file
  • scrollbar – adds a scrollbar to hterm tabs

Themes

This project follows the all-contributors specification. Contributions of any kind welcome!

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 day ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago