Connect your devices and agents directly - no accounts, no cloud, no subscriptions.
Works even when your network blocks everything.
curl -sSL get.shurli.io | shor
curl -sSL https://raw.githubusercontent.com/shurlinet/shurli/dev/tools/install.sh | shNo accounts. No cloud. Interactive setup walks you through everything.
The install script handles setup. Here's what happens next.
Run the install script. Choose relay server (VPS) or peer node (your device). Identity, config, and service setup handled automatically.
Run shurli invite to get a one-time code. Send it however you like - text, email, Signal, carrier pigeon.
Run shurli join on your laptop. Both devices trust each other automatically. Access any service through the encrypted tunnel.
Deploy a relay, then two commands on each device. No keys to exchange manually, no ports to forward.
5G, hotel WiFi, corporate networks, double NAT - if your device has internet, Shurli finds a way through. Tested on the networks that block everything.
Single binary, no containers, no runtimes, no databases. The install script detects your platform and handles everything. Works offline after pairing.
A simple file on your device decides who gets in. No accounts to manage, no tokens to rotate, no company in the middle. Your network, your rules.
One command on your server, one on your laptop. Share a code, done. From zero to connected in about 60 seconds.
Remote desktop, file servers, databases, web apps - anything running on your home network, accessible from anywhere as if you were on the same WiFi.
Network drops? It reconnects automatically. Bad config? It rolls back. Shurli monitors itself and recovers without you lifting a finger.
Zero-human companies are coming. They need a network that operates itself - where agents connect, negotiate, and transact directly. No cloud middleman. No central authority. Intelligence at every node.
Shurli is that network.
What connects your devices today is the foundation for what agents will run on tomorrow.
Shurli tries to connect your devices directly. When the network won't allow it, traffic flows through an encrypted relay, which never sees your data.
Different architectures make different trade-offs. Here's where Shurli sits.
| Shurli | Centralized VPN Services | Tunnel / Proxy Services | |
|---|---|---|---|
| Account required | None | Yes (vendor) | Yes (vendor) |
| Control plane | None (DHT) | Vendor server | Vendor server |
| Identity | Your Ed25519 keys | Vendor-managed | Vendor-managed |
| NAT traversal | Relay + hole-punching | Vendor relays + STUN | Vendor tunnels |
| Source code | Fully open | Client open, server proprietary | Varies |
| Self-hostable | Everything | Partial | No |
| Data visibility | Zero (relay sees nothing) | Coordination server sees device graph | Tunnel endpoint sees traffic |
Shurli is opinionated. It's built for a specific kind of user.
Shurli is experimental, but the core is solid and tested on real networks.
curl -sSL get.shurli.io | shor
curl -sSL https://raw.githubusercontent.com/shurlinet/shurli/dev/tools/install.sh | shFor pre-release builds: curl -sSL <URL> | SHURLI_DEV=1 sh