sqlmap/shell
Miroslav Stampar 0c286d8db2 minor update
2010-10-19 09:17:01 +00:00
..
backdoor.asp_ minor adjustment 2010-02-25 14:08:56 +00:00
backdoor.aspx_ new files 2010-01-27 13:55:13 +00:00
backdoor.jsp_ new files 2010-01-27 13:55:13 +00:00
backdoor.php_ fix - php backdoor script was not running on xampp 2010-04-26 13:01:16 +00:00
README.txt minor update 2010-10-19 09:17:01 +00:00
runcmd.exe_ new program for running command prompt commands 2010-02-21 08:52:54 +00:00
stager.asp_ Minor refactoring 2010-10-17 21:06:52 +00:00
stager.aspx_ Minor refactoring 2010-10-17 21:06:52 +00:00
stager.aspx.vb_ Minor refactoring 2010-10-17 21:06:52 +00:00
stager.php_ Minor refactoring 2010-10-17 21:06:52 +00:00

Due to the anti-virus positive detection of shell scripts stored inside
this folder, we needed to somehow circumvent this. As from the plain
sqlmap users perspective nothing has to be done prior to their usage by
sqlmap, but if you want to have access to their original source code use
the decrypt functionality of the ../extra/cloak/cloak.py utility.

To prepare the original scripts to the cloaked form use this command:
find backdoor.* stager.* -type f -exec python ../extra/cloak/cloak.py -i '{}' \;

To get back them into the original form use this:
find backdoor.*_ stager.*_ -type f -exec python ../extra/cloak/cloak.py -d -i '{}' \;