I assume the requirements for this are about this:
- eggdrop:
something around version 1.6+
something around TCL 8.2+
egghttp - HTTP Server:
php in non-safe mode or access to a bash/sh executable via "system"
.htaccess support for enhanced security
eggdrop: v1.6.18+notesfix
OS: CYGWIN_NT-5.1 1.5.13
Tcl: v8.4.7
egghttp: v1.1.0
Apache: v2.0.52 (Win32)
PHP: v4.3.10
What does it?
It queries the exec.php via a HTTP server and gives the stdout from to a specified callback proc. So this all will not just work under Cygwin, it will also not block the bot while the command is executed.
Please report me any security suggestions and bugs, I'll give it later a try to send it over to an email of windrop.cjb.net, if it can be confirmed to be ready for release.
Download (v0.1):
http://home.arcor.de/dekus/winexec.zip
http://home.arcor.de/dekus/winexec.tar.bz2
PS: The issue has been solved with the TCL 8.4.9 release of windrop.sourceforge.net