23 comments on “Hacking Windows 10 with Hercules

  1. Hello,

    Thanks for such great article.

    I wanted to ask what if the victim rebooted his/her machine? does presistent option reconnects to the attacker machine even after a reboot or a shutdown?

    Much Regards

  2. This is how to use it, but I was more interested in your tests against various AV vendor products. How about doing a post on that, and perhaps why hercules works?

  3. Pingback: Windows hacking with Cypher - hackercool.......

  4. Getting stuck like this

    root@kali:~/Hercules/SOURCE# go build HERCULES.go
    HERCULES.go:13:8: cannot find package “github.com/fatih/color” in any of:
    /usr/lib/go/src/pkg/github.com/fatih/color (from $GOROOT)
    ($GOPATH not set)

    please advise

  5. I type go env and the terminal shows this GOARCH=”386″
    GOGCCFLAGS=”-fPIC -m32 -pthread -fmessage-length=0″

    • @Shadowwalker, There is another howto on my blog regarding hercules which fixes all the problems you are facing. Search for “windows hacking with hercules”.

    • @fadil, At the time we made the payload, it was fully undetectable (FUD). As time passes, some antivirus may detect it. The relation between malware and anti-malware is like between newt and garter snake and need to be discussed elaborately. But the tool is constantly updated.

  6. Hi all..as usuale the Victim have to be a stupid nan
    Who put on his sistema a Troian or a simil-virus…
    I read a Lot of stuff all need a week sistema and of a stupido user…blanda
    Have you somestuff to use against a Very protect system

    • Hi Espmat. Thanks for your frank opinion. At the beginning of my career in Cyber security, even I used to think exactly like you. As time progressed, I learnt that hacking is never about the target machine or the tools we are using. It’s in the mind. The hacking world has coined a term for it “Social Engineering”. It’s convincing the user to do what he will not do normally.
      You are right. The victim will not click on a virus if we send it normally. But when a user is lured to click on our malicious file using a ruse, it will work. Social engineering always works. Many recent data breaches are a testimony to this.

  7. Pingback: Windows 10 Privilege Escalation using Fodhelper - hackercool.......

  8. Pingback: Windows hacking with Cypher

Leave a Reply

Your email address will not be published. Required fields are marked *