Plink, short for PuTTY Link, is a Windows command-line SSH tool that comes as a part of the PuTTY package when installed.
Plink can also be used to create dynamic port forwards and SOCKS proxies.
Before the Fall of 2018, Windows did not have a native ssh client included, so users would have to install their own. The tool of choice for many a sysadmin who needed to connect to other hosts was PuTTY.

The Windows attack host starts a plink.exe process with the below command-line arguments to start a dynamic port forward over the Ubuntu server. This starts an SSH session between the Windows attack host and the Ubuntu server, and then plink starts listening on port 9050.
plink -ssh -D 9050 ubuntu@10.129.15.50
Another Windows-based tool called Proxifier can be used to start a SOCKS tunnel via the SSH session we created. Proxifier is a Windows tool that creates a tunneled network for desktop client applications and allows it to operate through a SOCKS or HTTPS proxy and allows for proxy chaining.
It is possible to create a profile where we can provide the configuration for our SOCKS server started by Plink on port 9050.

After configuring the SOCKS server for 127.0.0.1 and port 9050, we can directly start mstsc.exe to start an RDP session with a Windows target that allows RDP connections.
Download OpenVPN and Install it
https://openvpn.net/community-downloads/
#To Connect
"C:\\Program Files\\OpenVPN\\bin\\openvpn-gui.exe" --command connect yourconfigfile.ovpn
#To Disconnect
"C:\\Program Files\\OpenVPN\\bin\\openvpn-gui.exe" --command disconnect yourconfigfile.ovpn
#Alternative
openvpn.exe --config "path/to/config.ovpn"
https://gist.github.com/montasim/11e313f82dc6c2aea28298941158429f