Here are some tools that allow an attacker to download a file from the target machine to his own (or one that he controls).

For more methods...

See LOLBAS and GTFObins for more file upload/download methods with native binaries.