The OMNI C2
Interface
React 18 web application running on your Kali server. Any browser, any OS. No Java, no thick client, no installs on the operator side.
Filter by category and OpSec level. Each module shows privilege requirements, EDR risk level, and a one-line description. Execute instantly from the browser — no command memorisation required.
| NAME | CATEGORY | DESCRIPTION | OPSEC | PRIVILEGE |
|---|---|---|---|---|
| ad_wmi | 🔍 Discovery | Comprehensive AD enumeration via WMI | Low | User |
| admin-harvester | 🔑 Credentials | Modern UI popup to trick user into granting admin | High | Admin |
| auto_elevate | 📋 Privilege | Automated UAC bypass using fodhelper method | High | User |
| arp | 🌍 Network | Display ARP table for network device discovery | Silent | User |
| bof | ⚡ Exec | Execute a BOF in-memory (TrustedSec format) | Low | User |
| ca_enum | 🔍 Discovery | Enumerate ADCS Certificate Authorities and vulns | Low | User |
Generate Arduino sketches for HID-based initial access. PS5 stager or C# stager. Dynamic Gist / TinyURL delivery. English or Hungarian keyboard layout. Compatible with Leonardo, Pro Micro, Teensy.
Real-time security check dashboard. Detects TOR SOCKS, VPN interfaces, Kill Switch, and ProxyChains. Aggregates a 0–100 OpSec score with actionable recommendations. Always know your exposure before running a module.
Browse the target file system graphically from the OMNI web UI. Navigate drives, download files with one click, create folders, and toggle hidden items — no separate file transfer tool required.
| NAME | SIZE | MODIFIED | |
|---|---|---|---|
| ► | Program Files | <DIR> | 2026-04-24 |
| ► | Program Files (x86) | <DIR> | 2026-04-24 |
| ► | System32 | <DIR> | 2026-02-09 |
| ► | Temp | <DIR> | 2026-04-22 |
| ► | Users | <DIR> | 2026-04-24 |
| ► | Windows | <DIR> | 2026-04-24 |
| DumpStack.log | 12.0 KB | DL |
Ready to run it yourself?
Start with the Starter plan. 7-day money-back guarantee. Deploy in under 15 minutes.