Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 21 Dec 2019 00:20:51 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 242750] [NEW PORT] sysutils/py-pypsexec: Run commands on a remote Windows host using SMB/RPC
Message-ID:  <bug-242750-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D242750

            Bug ID: 242750
           Summary: [NEW PORT] sysutils/py-pypsexec: Run commands on a
                    remote Windows host using SMB/RPC
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-bugs@FreeBSD.org
          Reporter: rozhuk.im@gmail.com

Created attachment 210088
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D210088&action=
=3Dedit
pypsexec

This library can run commands on a remote Windows host through Python.
This means that it can be run on any host with Python and does not
require any binaries to be present or a specific OS. It uses SMB/RPC to
executable commands in a similar fashion to the popular PsExec tool.
More details on this tool can be read on this blog post.

The executable wrapper that is sent to the service is based on the
PAExec library. PAExec is an free, redistributable and open source
equivalent to Microsoft's PsExec application. This program is stored as
a binary in this package and is used to run the remote service and
start the process execution.


WWW: https://github.com/jborean93/pypsexec

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-242750-7788>