Windows Remote Executor is a two-part toolkit for operating Windows hosts from macOS or Linux Codex-style agentic workflows.
windows-remote-executor/is the local shell wrapperwindows-remote-executor-native/is the Windows-side native executor
The design goal is simple: keep SSH as the transport, keep PowerShell as a reluctant fallback, and prefer a dropped native executable plus file transfer over brittle inline script transport. That reduces local quoting failures, keeps the control plane easier to reason about, and narrows the amount of PowerShell/AMSI-shaped surface used during normal automation.
- remote
cmd.exe, native process, and Python execution - structured capture for localized or byte-sensitive process output
- Windows-local PowerShell decode path for the cases where PowerShell is unavoidable
- JSON host probing
- staged directory deploys
- hot updates for the remote tool directory
- private-network policy enforcement
- optional access-token requirement for native commands
- automatic
sshddisablement when listener exposure drifts outside policy - explicit
repair-sshd/win-remote repairself-heal for config or startup drift
- default mode is
private-only - private mode allows only standard private IPv4 ranges plus loopback and link-local recovery addresses
- wildcard listeners are treated as unsafe
- public exposure is opt-in only, requires an access token hash, and is explicitly labeled
- the guard can run manually or as a scheduled task
The native project supports two Windows publish modes:
- framework-dependent: smaller, easier to inspect, better for GitHub/source releases
- self-contained single-file: easier to drop on a host, but more likely to trigger generic
.NET packer/compressionheuristics
Start with the framework-dependent publish unless you specifically need drop-and-run deployment.
The current framework-dependent build targets .NET 8 on Windows.
This repository also ships agent-facing entrypoints that are meant to be discovered directly by tooling:
- AGENTS.md for repository-local agent guidance
- CLAUDE.md for Claude Code style entrypoint discovery
- CODEX.md for Codex style entrypoint discovery
- templates/AGENT_INSTRUCTIONS_TEMPLATE.md for copy-paste system-prompt or task-brief usage
If an agent opens this repository cold, the shortest safe path is:
- Read
AGENTS.md. - Read
windows-remote-executor/README.md. - Run
./windows-remote-executor/bin/win-remote probe <target>. - Prefer
run,capture,py,put,get,deploy,policy,guard,repair, andupdate-tools. - Use
exec --fileonly when PowerShell is actually needed.
MIT.
This export was prepared as a standalone executor-only repository and intentionally excludes the rest of the workspace.
Source, docs, and packaging for this repo were produced end-to-end with Codex.