APK (Android Package Kit) files are the raw files of an Android app. Learn how to install winrm-pro.apk file on your phone in 4 Simple Steps:
Yes. We provide some of the safest Apk download mirrors for getting the WinRM Pro apk.
I bought this looking not only to maintain my servers remotely, but also to have fully functional PowerShell capabilities in my pocket. I can continue to learn PowerShell when I’m away from my computer as well as remotely administer my machine. A little tricky to set up at first, but that was due to the Windows remote configuration (Microsoft). Jans website was very clear on how to do it and after following her steps, success! A must have for anyone that needs to remotely control / monitor their machines from an Android. Fantastic work!!
Amazing app!! Finally there is a full functional power-shell environment for iOS I use it a lot, in my line of work is very important to run scripts and this app give me the tools! I’m using this app for about 6 months and it’s worth every penny! A request for the developer, if I’ll be able to sync my scripts between my Android and my Mobile it will be great. Maybe try to save the script on a cloud drive. just a though... Thanks again for this amazing app! 👍🏽 Shakel. * got my new Android 11 Pro And the app is crushing after connecting the server! Please update/fix it.
I only realized this product needs a server side app be installed after spending the 8 bucks. What a waste.
Generally reviews has to be earned and validated from my behalf before I eagerly slap down a five-star rating on any application. This application certainly does a very well job connecting remotely on a private network and cellular remote connection. Ján is amazing in communication and very responsive to your needs. I’m very satisfied and grateful of her commitment to the development of WinRM. Thank you Ján.!!!
This app relies on the administrator installing unsigned executables on the target machine. The client code must be configured with certificates and group policy changes as well as certificate management. The hostname or ip address of the target machine are to be baked into the certificates. This isn’t suitable for many network environments such as mine where a static IP is not available. This may be usable in an enterprise environment but the level of required configuration is too high for the average user.
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |