You don't need programming skillz to do this.
Once you have a shell you can download/install any program as a service backdoor, including metasploit payloads.
(You probably know that you can generate metasploit "exe" payloads, right?)
hint: the "sc" command in windows. I leave the rest of the fun up to you