mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-10-26 05:31:04 +03:00 
			
		
		
		
	* It is stealthier as the shellcode itself does not touch the filesystem, it's an argument passed to shellcodeexec at runtime. * shellcodeexec is not (yet) recognized as malicious by any (Avast excluded) AV product. * shellcodeexec binary size is significantly smaller than a Metasploit payload stager (even when packed with UPX). * UPX now is not needed anymore, so sqlmap package is also way smaller and less likely to be detected itself as malicious by your AV software. shellcodeexec source code, compilation files and binaries are in extra/shellcodeexec/ folder now - copied over from https://github.com/inquisb/shellcodeexec. Minor code refactoring.
		
			
				
	
	
		
			26 lines
		
	
	
		
			865 B
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			26 lines
		
	
	
		
			865 B
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| Before compiling, an enviroment variable has to be set.
 | |
| 
 | |
| --------------------------------------------------------------------------
 | |
| Variable name			Variable description
 | |
| --------------------------------------------------------------------------
 | |
| PLATFORM_SDK_DIR		Directory where the Platform SDK is installed
 | |
| 
 | |
| 
 | |
| Procedure for setting environment variables on Windows:
 | |
| My Computer -> Properties -> Advanced -> Environment Variables
 | |
| User variables -> New
 | |
| 
 | |
| 
 | |
| Sample value:
 | |
| --------------------------------------------------------------------------
 | |
| Variable name			Variable value
 | |
| --------------------------------------------------------------------------
 | |
| PLATFORM_SDK_DIR		C:\Program Files\Microsoft Platform SDK for Windows Server 2003 R2
 | |
| 
 | |
| 
 | |
| Notes:
 | |
| 
 | |
| To get as small portable executable as possible compile as follows:
 | |
| * Use Visual C++ 2005
 | |
| * Strip the executable with UPX
 |