Hello,
There is no "out-of-the box" solution, all of the infections need thorough examination, to discover the entry point, files affected, vulnerability used in the particular case and how to mitigate or solve it.
It all depends on whether you have full access to the server shell or just working with a CPanel/Plesk/etc. There are a lot of considerations and a brief skype tutorial might not cover all of it.