Security_Code/Langzi_Api半成品-不再更新/GET_SQL/lib/sqlmap/shell
LangziFun f2c2ffbeb8 Change 2019-07-19 16:44:54 +08:00
..
backdoors Change 2019-07-19 16:44:54 +08:00
stagers Change 2019-07-19 16:44:54 +08:00
README.txt Change 2019-07-19 16:44:54 +08:00

README.txt

Due to the anti-virus positive detection of shell scripts stored inside this folder, we needed to somehow circumvent this. As from the plain sqlmap users perspective nothing has to be done prior to their usage by sqlmap, but if you want to have access to their original source code use the decrypt functionality of the ../extra/cloak/cloak.py utility.

To prepare the original scripts to the cloaked form use this command:
find backdoors/backdoor.* stagers/stager.* -type f -exec python ../extra/cloak/cloak.py -i '{}' \;

To get back them into the original form use this:
find backdoors/backdoor.*_ stagers/stager.*_ -type f -exec python ../extra/cloak/cloak.py -d -i '{}' \;