MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network.
This issue seemed unavoidable no matter which versions of python3/windows I tried. I think I have fixed the issue in PR https://github.com/trustedsec/meterssh/pull/9 . Reverse Meterpreter sessions work now.
When Using python3 I get the following Error.
Traceback (most recent call last): File "c:\meterssh\meterssh_og.py", line 48, in inject ctypes.c_int(len(shellcode))) ctypes.ArgumentError: argument 1: <class 'TypeError'>: wrong type