[Bug 242750] [NEW PORT] sysutils/py-pypsexec: Run commands on a remote Windows host using SMB/RPC
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Sat Dec 21 00:20:51 UTC 2019
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=242750
Bug ID: 242750
Summary: [NEW PORT] sysutils/py-pypsexec: Run commands on a
remote Windows host using SMB/RPC
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Severity: Affects Some People
Priority: ---
Component: Individual Port(s)
Assignee: ports-bugs at FreeBSD.org
Reporter: rozhuk.im at gmail.com
Created attachment 210088
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=210088&action=edit
pypsexec
This library can run commands on a remote Windows host through Python.
This means that it can be run on any host with Python and does not
require any binaries to be present or a specific OS. It uses SMB/RPC to
executable commands in a similar fashion to the popular PsExec tool.
More details on this tool can be read on this blog post.
The executable wrapper that is sent to the service is based on the
PAExec library. PAExec is an free, redistributable and open source
equivalent to Microsoft's PsExec application. This program is stored as
a binary in this package and is used to run the remote service and
start the process execution.
WWW: https://github.com/jborean93/pypsexec
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list