Here are some tricks and tips to transfer files from target machines to the attacker's machine, where the target can be either Windows or Linux.
File Hash