2010-02-12 03:20:53 +03:00
|
|
|
Due to the anti-virus positive detection of executable stored inside this
|
|
|
|
folder, we needed to somehow circumvent this. As from the plain sqlmap
|
|
|
|
users perspective nothing has to be done prior to its usage by sqlmap, but
|
|
|
|
if you want to have access to the original executable use the decrypt
|
|
|
|
functionality of the ../../../../extra/cloak/cloak.py utility.
|
2010-01-29 13:12:09 +03:00
|
|
|
|
|
|
|
To prepare the executable to the cloaked form use this command:
|
|
|
|
python ../../../../extra/cloak/cloak.py -i upx.exe
|
|
|
|
|
|
|
|
To get back the original executable use this:
|
2010-02-12 03:20:53 +03:00
|
|
|
python ../../../../extra/cloak/cloak.py -d -i upx.exe_
|