[Bug 242750] [NEW PORT] sysutils/py-pypsexec: Run commands on a remote Windows host using SMB/RPC

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Sat Dec 21 00:20:51 UTC 2019


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=242750

            Bug ID: 242750
           Summary: [NEW PORT] sysutils/py-pypsexec: Run commands on a
                    remote Windows host using SMB/RPC
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-bugs at FreeBSD.org
          Reporter: rozhuk.im at gmail.com

Created attachment 210088
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=210088&action=edit
pypsexec

This library can run commands on a remote Windows host through Python.
This means that it can be run on any host with Python and does not
require any binaries to be present or a specific OS. It uses SMB/RPC to
executable commands in a similar fashion to the popular PsExec tool.
More details on this tool can be read on this blog post.

The executable wrapper that is sent to the service is based on the
PAExec library. PAExec is an free, redistributable and open source
equivalent to Microsoft's PsExec application. This program is stored as
a binary in this package and is used to run the remote service and
start the process execution.


WWW: https://github.com/jborean93/pypsexec

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list