Open Source · Free · Windows

Manage AWS SSM
Sessions with ease

A powerful Windows desktop app to manage EC2 instances via AWS Systems Manager. SSH, RDP, port forwarding and file transfer — all from a single, intuitive interface. No VPN, no bastion host, no open inbound ports.

Windows 10 / 11 No admin rights needed Runs 100% locally
100%
Local — no cloud dependency
5
Connection & management types
Free
Open source, MIT license
Features

Everything you need to manage
EC2 instances via AWS SSM

No VPN, no bastion host — just your AWS credentials and SSM Manager.

SSH Sessions

Open a terminal to any SSM-enabled Linux instance in one click. The connection closes automatically when you exit the terminal.

LinuxAutomatic cleanup

RDP Connections

Connect to Windows instances via Remote Desktop. SSM Manager sets up the port tunnel and launches mstsc automatically.

WindowsAuto port allocation

Port Forwarding

Forward any port from the instance or through it to a remote host. Useful for databases, internal dashboards and microservices.

Local modeRemote host modelocalhost link
New in v2.0

File Transfer (SCP)

Upload or download files to/from Linux instances via SCP over an automatic SSH tunnel. Progress bar with speed and ETA.

Upload & DownloadProgress bar

Smart Instance List

Search by name or instance ID, filter by type (Linux, Windows, SSM, active connections), and navigate large fleets with pagination.

Search by name or IDFilter badgesPagination

Multi-Profile Support

Detects all AWS profiles from ~/.aws/credentials and ~/.aws/config. Supports SSO, role_arn and Leapp.

AWS SSOrole_arnLeapp
New in v2.1

Windows Password Decrypt

Decrypt the EC2 Windows Administrator password directly inside SSM Manager. Paste your PEM private key — decryption happens locally via RSA, never sent to AWS.

Windows onlyRSA PKCS1v15100% local
How it works

From install to connected
in under 2 minutes

01

Install

Download and run the installer. No admin rights required. SSM Manager installs to your local user profile. See system requirements before installing.

02

Select Profile & Region

Pick your AWS CLI profile and region. SSM Manager reads your existing credentials automatically — no setup needed.

03

Connect

Click Connect to see all your SSM-enabled EC2 instances. SSH, RDP, forward a port or transfer a file in one click.

AWS SSM

What is AWS Systems Manager?

AWS Systems Manager (SSM) is a broad AWS management service that covers patch management, parameter store, run command, automation, inventory, OpsCenter and more.

In this context we focus on one specific capability: Session Manager — which provides secure, auditable remote access to EC2 instances via a reverse tunnel over HTTPS, with no open inbound ports, no bastion host and no long-lived credentials.

Official AWS Session Manager documentation

Your Machine
SSM Manager
Port 443 outbound only
AWS SSM Service
Regional Endpoint
Encrypted, managed by AWS
EC2 Instance
SSM Agent
Private subnet OK · No public IP
No inbound ports required

Security groups can block all inbound traffic. The SSM Agent initiates the outbound connection — there is nothing to expose.

IAM access control

Access is granted through IAM policies. Revoke access instantly by removing IAM permissions — no SSH key rotation needed.

CloudTrail audit log requires setup

Session Manager API calls can be logged in AWS CloudTrail for full accountability. Not enabled by default — you must enable CloudTrail in your AWS account and optionally configure session logging to S3 or CloudWatch Logs.

End-to-end encryption

All traffic between your machine and the instance is encrypted using TLS 1.2+. No plaintext credentials or data in transit.

No bastion host needed

Eliminate the operational overhead, patching and cost of maintaining bastion/jump hosts. AWS SSM is the secure channel.

No long-lived SSH keys

Session Manager does not require SSH key pairs on the instance. Zero standing credentials stored on your EC2 machines.

Compliance-ready — with the right setup: when CloudTrail and session logging are configured, every session start, port forward and file transfer generates events with user identity, timestamp and target instance. Session content can be streamed to Amazon S3 or CloudWatch Logs for long-term retention — satisfying SOC 2, ISO 27001 and PCI-DSS audit requirements. These settings must be explicitly enabled in the Session Manager preferences in the AWS console.

Connection Types

Five ways to reach your instances

SSH Linux

Opens a terminal window with a direct SSM SSH session. No key pair required on the instance — IAM permissions are enough. The connection is automatically removed from the active list when the terminal closes.

No open inbound ports needed
Works through NAT and firewalls

RDP Windows

Creates a secure SSM tunnel to port 3389 and launches Windows Remote Desktop automatically. A dynamic local port is allocated so multiple RDP sessions can run simultaneously.

Launches mstsc automatically
Dynamic port — no conflicts

Port Forwarding Custom

Two modes: forward a port directly on the instance (e.g. a local database on port 5432), or route traffic through the instance to a remote host and port (e.g. an RDS endpoint). A clickable localhost link is shown for HTTP/HTTPS tunnels.

Local mode (instance port)
Remote host mode (via instance)

File Transfer SCP · Linux

Upload a file from your PC to the instance, or download a file from the instance to a local folder. Transfer runs over a temporary SSM SSH tunnel — set up and torn down automatically. Native file/folder browser included.

Real-time progress bar + speed + ETA
Automatic tunnel lifecycle
Session management

All active sessions,
always under control

Active connections are tracked in real time inside each instance card. Each session shows the connection type, start time, local and remote port details, and a one-click terminate button.

  • Per-instance inline connection view
  • SSH, RDP, Port Forward, File Transfer tracked separately
  • Amber indicator on cards with active sessions
  • One-click session termination
  • Auto-detection when a session closes externally
  • Update check at startup — notified when a new version is available
Prerequisites

What you need to get started

Windows 10 / 11

SSM Manager runs as a native Windows desktop application. No browser or server required.

AWS CLI + SSM Plugin

The AWS CLI and the Session Manager plugin must be installed and configured on your machine.

Install guide

AWS Credentials

Valid AWS credentials configured via the AWS CLI, AWS SSO, or Leapp.

SSM Agent on EC2

Instances must have the SSM Agent installed and the appropriate IAM permissions to use Session Manager.

Open Source

Contributions welcome

SSM Manager is community-driven. Every bug report, pull request and idea makes it better for everyone.

Report a Bug

Found something broken or unexpected? Open a GitHub issue with steps to reproduce — even small reports are valuable.

Open an Issue

Submit a Pull Request

Fork the repo, implement your improvement on a feature branch, and open a pull request. All skill levels welcome — from docs to new features.

Fork & Contribute

Request a Feature

Have an idea for an improvement? Share it as a feature request on GitHub Issues. The backlog is open — vote on existing ideas or propose new ones.

View Backlog

SSM Manager is MIT-licensed and actively maintained. Contributions of all kinds are welcome: code, documentation, bug reports, translations, UI improvements. Check the project backlog for open items, or browse release notes to see what has already shipped.

View on GitHub

Ready to simplify your AWS workflow?

Free, open source and no subscription needed. Just download and connect.

Fully open source — MIT license, no telemetry, no accounts, no subscription.