17 comments on “Hacking Windows 10 with Hercules

  1. Hello,

    Thanks for such great article.

    I wanted to ask what if the victim rebooted his/her machine? does presistent option reconnects to the attacker machine even after a reboot or a shutdown?

    Much Regards
    Abdullah

  2. This is how to use it, but I was more interested in your tests against various AV vendor products. How about doing a post on that, and perhaps why hercules works?

  3. Pingback: Windows hacking with Cypher - hackercool.......

  4. Getting stuck like this

    root@kali:~/Hercules/SOURCE# go build HERCULES.go
    HERCULES.go:13:8: cannot find package “github.com/fatih/color” in any of:
    /usr/lib/go/src/pkg/github.com/fatih/color (from $GOROOT)
    ($GOPATH not set)

    please advise

  5. I type go env and the terminal shows this GOARCH=”386″
    GOBIN=””
    GOCHAR=”8″
    GOEXE=””
    GOHOSTARCH=”386″
    GOHOSTOS=”linux”
    GOOS=”linux”
    GOPATH=”/usr/lib/go/src”
    GORACE=””
    GOROOT=”/usr/lib/go”
    GOTOOLDIR=”/usr/lib/go/pkg/tool/linux_386″
    CC=”gcc”
    GOGCCFLAGS=”-fPIC -m32 -pthread -fmessage-length=0″
    CXX=”g++”
    CGO_ENABLED=”1″

    • @Shadowwalker, There is another howto on my blog regarding hercules which fixes all the problems you are facing. Search for “windows hacking with hercules”.

    • @fadil, At the time we made the payload, it was fully undetectable (FUD). As time passes, some antivirus may detect it. The relation between malware and anti-malware is like between newt and garter snake and need to be discussed elaborately. But the tool is constantly updated.

Leave a Reply

Your email address will not be published. Required fields are marked *