file transfer

  1. File Transfer Cheatsheet: Windows and Linux

    File transfer is considered to be one of the most important steps involved in Post Exploitation. So, today in this article we are going to highlight the several techniques which can be used by the pentester to transfer files to the victim machine( Windows and Linux Machine) Table of Contents...