Please check the build logs for more information.
See Builds for ideas on how to fix a failed build, or Metadata for how to configure docs.rs builds.
If you believe this is docs.rs' fault, open an issue.
Mousehop is a fork of lan-mouse by Ferdinand Schober (feschber) and its contributors. Forked in April 2026 and rebranded as Mousehop in May 2026, it is a modified version distributed under the same GNU GPL-3.0-or-later license. Huge thanks to the original author and contributors — see
NOTICEfor attribution details.
Mousehop is a cross-platform mouse and keyboard sharing software similar to universal-control on Apple devices. It allows for using multiple PCs via a single set of mouse and keyboard. This is also known as a Software KVM switch.
Goal of this project is to be an open-source alternative to proprietary tools like Synergy 2/3, Share Mouse and other open source tools like Deskflow or Input Leap (Synergy fork).
Focus lies on performance, ease of use and a maintainable implementation that can be expanded to support additional backends for e.g. Android, iOS, ... in the future.
blazingly fast™ because it's written in rust.
- Now with a gtk frontend
Encryption
Mousehop encrypts all network traffic using the DTLS implementation provided by WebRTC.rs. There are currently no mitigations in place for timing side-channel attacks.
OS Support
Most current desktop environments and operating systems are fully supported, this includes
- GNOME >= 45
- KDE Plasma >= 6.1
- Most wlroots based compositors, including Sway (>= 1.8), Hyprland and Wayfire
- Windows
- MacOS
Caveats / Known Issues
[!Important]
X11 currently only has support for input emulation, i.e. can only be used on the receiving end.
Sway / wlroots: Wlroots based compositors without libei support on the receiving end currently do not handle modifier events on the client side. This results in CTRL / SHIFT / ALT / SUPER keys not working with a sending device that is NOT using the
layer-shellbackendWayfire: If you are using Wayfire, make sure to use a recent version (must be newer than October 23rd) and add
shortcuts-inhibitto the list of plugins in your wayfire config! Otherwise input capture will not work.Windows: The mouse cursor will be invisible when sending input to a Windows system if there is no real mouse connected to the machine.
For more detailed information about os support see Detailed OS Support
Android & IOS
A proof of concept for an Android / IOS Application by rohitsangwan01 can be found here. It can be used as a remote control for any device supported by Mousehop.
Installation
Mousehop is a young fork and is not yet packaged in distribution repositories (Arch, Fedora, nixpkgs). Until then, install from a release binary, the Nix flake, or build from source.
- flake: README.md
- Download the
.dmgfor your Mac (Intel or Apple Silicon) from the releases page - Open the
.dmgand dragMousehop.appintoApplications - Launch the app — release builds are signed with a Developer ID and notarized by Apple, so it opens with no Gatekeeper prompt
- Use the menu bar item to open the settings window or quit Mousehop. Bundled macOS builds run as a menu bar app and do not keep a Dock icon visible.
- Grant accessibility permissions in System Settings
First make sure to install the necessary dependencies.
Precompiled release binaries for Windows, MacOS and Linux are available in the releases section. For Windows, the depenedencies are included in the .zip file, for other operating systems see Installing Dependencies.
Alternatively, the mousehop binary can be compiled from source (see below).
Installing desktop file, app icon and firewall rules (optional)
# install mousehop (replace path/to/ with the correct path)
# install app icon
# update icon cache
# install desktop entry
# when using firewalld: install firewall rule
# -> enable the service in firewalld settings
Instead of downloading from the releases, the mousehop binary
can be easily compiled via cargo or nix:
Compiling and installing manually:
# compile in release mode
# install mousehop
Compiling and installing via cargo:
# will end up in ~/.cargo/bin
Compiling and installing via nix:
# you can find the executable in result/bin/mousehop
Conditional compilation
Support for other platforms is omitted automatically based on the active rust toolchain.
Additionally, available backends and frontends can be configured manually via cargo features.
E.g. if only support for sway is needed, the following command produces
an executable with support for only the layer-shell capture backend
and wlroots emulation backend:
For a detailed list of available features, checkout the Cargo.toml
Development
Git pre-commit hook
This repository includes a local git hooks directory .githooks/ with a pre-commit script that enforces formatting, lints, and tests before allowing a commit. It is optional to enable it, but it will prevent you from committing code with failing unit tests or that needs clippy/fmt fixes. To enable the hook locally:
- Make the hook executable:
- Point git to the hooks directory (one-time per clone):
The pre-commit script runs cargo fmt --all (and fails if files were modified), cargo clippy --workspace --all-targets --all-features -- -D warnings, and cargo test --workspace --all-features.
Dependencies & Compiling from Source
# Install dependencies
# Create the macOS icon file
# Create the .app bundle
# Copy all dynamic libraries into the bundle, and update the bundle to find them there
-
First install Rust.
-
Then follow the instructions at gtk-rs.org
TLDR:
Build gtk from source
- The following commands should be run in an admin power shell instance:
# install chocolatey
; )))
# install gvsbuild dependencies
- The following commands should be run in a regular power shell instance:
# install gvsbuild with python
- Relaunch your powershell instance so the changes in the environment are reflected.
# build gtk + libadwaita
- Make sure to add the directory
C:\gtk-build\gtk\x64\release\binto thePATHenvironment variable. Otherwise the project will fail to build.
To avoid building GTK from source, it is possible to disable the gtk frontend (see conditional compilation).
Usage
By default the gtk frontend will open when running mousehop.
To connect a device you want to control, simply click the Add button and enter the hostname
of the device.
On the remote device, authorize your local device for incoming traffic using the Authorize button
under the "Incoming Connections" section.
The fingerprint for authorization can be found under the general section of your local device.
It is of the form "aa:bb:cc:..."
Authorized devices can be persisted using the configuration file (see Configuration).
If the device still can not be entered, make sure you have UDP port 4252 (or the one selected) opened up in your firewall.
The cli interface can be accessed by passing cli as a commandline argument.
Use
to list the available commands and
for information on how to use a specific command.
Mousehop can be launched in daemon mode to keep it running in the background (e.g. for use in a systemd-service).
To do so, use the daemon subcommand:
Systemd Service
In order to start mousehop with a graphical session automatically, the systemd-service can be used:
Copy the file to ~/.config/systemd/user/ and enable the service:
[!Important] Make sure to point
ExecStart=/usr/bin/mousehop daemonto the actualmousehopbinary (in case it is not under/usr/bin, e.g. when installed manually.
Configuration
To automatically load clients on startup, the file $XDG_CONFIG_HOME/mousehop/config.toml is parsed.
$XDG_CONFIG_HOME defaults to ~/.config/.
To create this file you can copy the following example config:
Example config
[!TIP] key symbols in the release bind are named according to their names in input-event/src/scancode.rs#L172. This is bound to change
# example configuration
# configure release bind
= [ "KeyA", "KeyS", "KeyD", "KeyF" ]
# optional port (defaults to 4252)
= 4252
# list of authorized tls certificate fingerprints that
# are accepted for incoming traffic
[]
= "iridium"
# define a client on the right side with host name "iridium"
[[]]
# position (left | right | top | bottom)
= "right"
# hostname
= "iridium"
# activate this client immediately when mousehop is started
= true
# optional list of (known) ip addresses
= ["192.168.178.156"]
# define a client on the left side with IP address 192.168.178.189
[[]]
= "left"
# The hostname is optional: When no hostname is specified,
# at least one ip address needs to be specified.
= "thorium"
# ips for ethernet and wifi
= ["192.168.178.189", "192.168.178.172"]
# optional port
= 4252
Where left can be either left, right, top or bottom.
Clipboard Sync
Optional bi-directional clipboard text sync between paired peers. Disabled by default; enable per pair from the GUI or by editing config.toml.
Per-pair gates
Each direction is independently gated. Both ends must opt in for clipboard text to flow that way:
- Outgoing:
clipboard_sendon each[[clients]]entry — when true, copies on this device propagate to that peer. - Incoming:
clipboard_receiveon each[authorized_fingerprints]entry — when true, clipboard text from that peer is applied to this device's clipboard.
Defaults are false. Existing pairs see no behavior change on upgrade.
Limitations
- Text only. No images, files, RTF/HTML, or multi-format pasteboard.
- 4 KiB max payload (originator fingerprint + content + length prefixes, conservative against typical UDP MTU). Larger copies are dropped at the sender with a debug log; the local clipboard is unaffected.
- UTF-8 only. Invalid byte sequences are rejected.
- Polling-based change detection (no native pasteboard event API exists on macOS), so very rapid recopies within a single poll tick may be coalesced.
App-source suppression
A per-OS suppression list lets you mark applications whose clipboard contents must never propagate (password managers, sensitive editors, Apple Messages, etc.). The frontmost app at the moment of copy is checked against the host-OS slot of clipboard_suppress_apps:
[]
= ["com.1password.1password", "com.apple.MobileSMS"]
= ["1Password.exe"]
= ["org.keepassxc.KeePassXC"]
= ["KeePassXC"]
Each machine reads/writes only the slot matching its own OS — the others round-trip untouched, so a single config can be shared across machines (dotfiles / Syncthing / etc.) without any one machine bleeding identifiers into the wrong section.
The GUI exposes this via Clipboard Privacy → Manage: a searchable picker of the apps currently running on this device (with name + icon), plus a list of currently-suppressed apps with one-click removal.
Automatic suppression on macOS
In addition to the user list, macOS clipboards stamped with the org.nspasteboard.ConcealedType UTI (the community convention used by 1Password, Bitwarden, KeePassXC, and most modern password managers) are auto-suppressed without needing a manual entry.
Loop prevention for 3+ peer fan-out
The wire frame carries the originator's TLS certificate fingerprint. The Service tracks (originator_fp, content_hash) for 1 second to prevent rebroadcast cycles in N-peer topologies (A→B→C won't echo back to A).
Roadmap
- Graphical frontend (gtk + libadwaita)
- respect xdg-config-home for config file location.
- IP Address switching
- Liveness tracking Automatically ungrab mouse when client unreachable
- Liveness tracking: Automatically release keys, when server offline
- MacOS KeyCode Translation
- Libei Input Capture
- MacOS Input Capture
- Windows Input Capture
- Encryption
- X11 Input Capture
- Latency measurement and visualization
- Bandwidth usage measurement and visualization
- Clipboard support (text, per-pair, with app-source suppression)
Detailed OS Support
In order to use a device for sending events, an input-capture backend is required, while receiving events requires a supported input-emulation and input-capture backend.
A suitable backend is chosen automatically based on the active desktop environment / compositor.
The following sections detail the emulation and capture backends provided by mousehop and their support in desktop environments / operating systems.
Input Emulation Support
| Desktop / Backend | wlroots | libei | remote-desktop portal | windows | macos | x11 |
|---|---|---|---|---|---|---|
| Wayland (wlroots) | :heavy_check_mark: | |||||
| Wayland (KDE) | :heavy_check_mark: | :heavy_check_mark: | ||||
| Wayland (Gnome) | :heavy_check_mark: | :heavy_check_mark: | ||||
| Windows | :heavy_check_mark: | |||||
| MacOS | :heavy_check_mark: | |||||
| X11 | :heavy_check_mark: |
wlroots: This backend makes use of the wlr-virtual-pointer-unstable-v1 and virtual-keyboard-unstable-v1 protocols and is supported by most wlroots based compositors.libei: This backend uses libei and is supported by GNOME >= 45 or KDE Plasma >= 6.1.xdp: This backend uses the freedesktop remote-desktop-portal and is supported on GNOME and Plasma.x11: Backend for X11 sessions.windows: Backend for Windows.macos: Backend for MacOS.
Input Capture Support
| Desktop / Backend | layer-shell | libei | windows | macos | x11 |
|---|---|---|---|---|---|
| Wayland (wlroots) | :heavy_check_mark: | ||||
| Wayland (KDE) | :heavy_check_mark: | :heavy_check_mark: | |||
| Wayland (Gnome) | :heavy_check_mark: | ||||
| Windows | :heavy_check_mark: | ||||
| MacOS | :heavy_check_mark: | ||||
| X11 | WIP |
layer-shell: This backend creates a single pixel wide window on the edges of Displays to capture the cursor using the layer-shell protocol.libei: This backend uses libei and is supported by GNOME >= 45 or KDE Plasma >= 6.1.windows: Backend for input capture on Windows.macos: Backend for input capture on MacOS.x11: TODO (not yet supported)