# Post Exploitation

- [File transfers between target and attacking machine](/pentips/post-exploitation/file-transfers.md)
- [Maintaining Access](/pentips/post-exploitation/maintaining-access.md)
- [Pivoting](/pentips/post-exploitation/pivoting.md)
- [Cleaning up](/pentips/post-exploitation/cleanup.md)
