sqlmap/lib/contrib/upx/windows
2010-01-29 10:12:09 +00:00
..
README.txt cloaked upx for windows (used mkstemp because of execution and file access rights problem) 2010-01-29 10:12:09 +00:00
upx.exe_ cloaked upx for windows (used mkstemp because of execution and file access rights problem) 2010-01-29 10:12:09 +00:00

Due to the anti-virus positive detection of executable stored inside this folder, 
we needed to somehow circumvent this. As from the plain sqlmap users perspective nothing
has to be done prior to its usage by sqlmap, but if you want to have access to the
original executable use the decrypt functionality of the ../../../../extra/cloak/cloak.py utility.

To prepare the executable to the cloaked form use this command:
python ../../../../extra/cloak/cloak.py -i upx.exe

To get back the original executable use this:
python ../../../../extra/cloak/cloak.py -d -i upx.exe_