Bug 242750 - [NEW PORT] sysutils/py-pypsexec: Run commands on a remote Windows host using SMB/RPC
Summary: [NEW PORT] sysutils/py-pypsexec: Run commands on a remote Windows host using ...
Status: Open
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Only Me
Assignee: freebsd-ports-bugs mailing list
URL: https://github.com/jborean93/pypsexec
Keywords: feature, needs-qa
Depends on: 242751
Blocks:
  Show dependency treegraph
 
Reported: 2019-12-21 00:20 UTC by rozhuk.im
Modified: 2020-02-19 16:27 UTC (History)
2 users (show)

See Also:


Attachments
pypsexec (1.98 KB, patch)
2019-12-21 00:20 UTC, rozhuk.im
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description rozhuk.im 2019-12-21 00:20:51 UTC
Created attachment 210088 [details]
pypsexec

This library can run commands on a remote Windows host through Python.
This means that it can be run on any host with Python and does not
require any binaries to be present or a specific OS. It uses SMB/RPC to
executable commands in a similar fashion to the popular PsExec tool.
More details on this tool can be read on this blog post.

The executable wrapper that is sent to the service is based on the
PAExec library. PAExec is an free, redistributable and open source
equivalent to Microsoft's PsExec application. This program is stored as
a binary in this package and is used to run the remote service and
start the process execution.


WWW: https://github.com/jborean93/pypsexec
Comment 1 rozhuk.im 2020-02-19 16:27:09 UTC
ping