sqlmap/shell
2010-02-04 13:08:48 +00:00
..
backdoor.asp_ new files 2010-01-27 13:55:13 +00:00
backdoor.aspx_ new files 2010-01-27 13:55:13 +00:00
backdoor.jsp_ new files 2010-01-27 13:55:13 +00:00
backdoor.php_ new files 2010-01-27 13:55:13 +00:00
README.txt bad grammar fix 2010-01-27 16:05:32 +00:00
uploader.asp_ new files 2010-01-27 13:55:13 +00:00
uploader.aspx_ new files 2010-01-27 13:55:13 +00:00
uploader.aspx.vb_ new files 2010-01-27 13:55:13 +00:00
uploader.php_ fix for HTTP_POST_FILES issue ( added if (phpversion() < '4.1.0')...else... ) 2010-02-04 13:08:48 +00:00

Due to the anti-virus positive detection of shell scripts stored inside this folder, 
we needed to somehow circumvent this. As from the plain sqlmap users perspective nothing
has to be done prior to their usage by sqlmap, but if you want to have access to their
original source code use the decrypt functionality of the ../extra/cloak/cloak.py utility.

To prepare the original scripts to the cloaked form use this command:
find backdoor.* uploader.* -type f -exec python ../extra/cloak/cloak.py -i '{}' \;

To get back them into the original form use this:
find backdoor.*_ uploader.*_ -type f -exec python ../extra/cloak/cloak.py -d -i '{}' \;