You can “upload” reverse shells using MySQL using INTO OUTFILE
:
The path may require some brute-forcing or additional reconnaissance; sometimes you can force an error to return a (potentially) writeable path. Depending on how the application you’re attacking is configured, it may be possible to exploit this via SQLi.
This can be used to bootstrap reverse shells.