Date: Sat, 21 Dec 2019 00:20:51 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 242750] [NEW PORT] sysutils/py-pypsexec: Run commands on a remote Windows host using SMB/RPC Message-ID: <bug-242750-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D242750 Bug ID: 242750 Summary: [NEW PORT] sysutils/py-pypsexec: Run commands on a remote Windows host using SMB/RPC Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: rozhuk.im@gmail.com Created attachment 210088 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D210088&action= =3Dedit pypsexec This library can run commands on a remote Windows host through Python. This means that it can be run on any host with Python and does not require any binaries to be present or a specific OS. It uses SMB/RPC to executable commands in a similar fashion to the popular PsExec tool. More details on this tool can be read on this blog post. The executable wrapper that is sent to the service is based on the PAExec library. PAExec is an free, redistributable and open source equivalent to Microsoft's PsExec application. This program is stored as a binary in this package and is used to run the remote service and start the process execution. WWW: https://github.com/jborean93/pypsexec --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-242750-7788>