malicious payload is going to be executed, and we can get a meterpreter session. But Additionally, it shops the agent (not ziped) into ImgBackdoor/output folder
as an example, assume that we want to add PHP file to https://umarpfig058512.wikicorrespondence.com/user