>>106375
I'll compile the builders for you
>Here, just run this binary, what could possibly go wrong
You're right though, get good or be willing to pay some coin.
Honestly, It's really not that hard depending on your target "audience"
Something I've wanted to try: writing a malicious client that would take instructions from a mailinator account, obviously the emailed instructions would be encrypted, and the decrypted data would need to have a verifier or unique identifier so some random doesn't hijack the instructions.
Perhaps the subject could be a hash and would map to a command, and every client would be given a key to decrypt the content of the email, but I know there's better ways to do this.
Just thought it might be a cool idea to at least see if it's feasible.
I've been fucking around with this too, but couldn't you communicate commands via dns requests?
So the client sends a dns request to a controlled server, the server responds with specific bytes for a command, and the response is parsed, blah blah blah.
Idk, just a thought, I'm not that well versed in writing botnet clients so I thought I'd ask.