From 2d8ad3ba8e06dc2d7d2b5239b4a40451a409c3e6 Mon Sep 17 00:00:00 2001 From: ankush shekhawat Date: Tue, 30 Oct 2018 15:57:55 +0530 Subject: [PATCH] Update README.txt --- shell/README.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/shell/README.txt b/shell/README.txt index 77b1c57ee..8c64ae49f 100644 --- a/shell/README.txt +++ b/shell/README.txt @@ -1,7 +1,7 @@ Due to the anti-virus positive detection of shell scripts stored inside this folder, we needed to somehow circumvent this. As from the plain sqlmap users perspective nothing has to be done prior to their usage by sqlmap, but if you want to have access to their original source code use the decrypt functionality of the ../extra/cloak/cloak.py utility. To prepare the original scripts to the cloaked form use this command: -find backdoors/backdoor.* stagers/stager.* -type f -exec python ../extra/cloak/cloak.py -i '{}' \; +find backdoors/backdoor.* stagers/stager.* -type f -exec python ../extra/cloak/cloak.py -i '{}' \; To get back them into the original form use this: find backdoors/backdoor.*_ stagers/stager.*_ -type f -exec python ../extra/cloak/cloak.py -d -i '{}' \;