USE CASES

Built for every phase of the engagement

From solo bug bounty hunting to enterprise red team ops — OMNI adapts to how your team works, not the other way around.

Solo Researchers
Red Team Leads
Security Firms
MSSP Operators

Active Directory Red Team Assessment

Map the full path from a single compromised workstation to Domain Admin. OMNI automates the entire kill chain — credential extraction, Kerberos attacks, lateral movement, and ADCS abuse — producing a timestamped evidence trail at every step.

  • Full AD kill chain: User desk → Domain Admin, documented
  • Kerberoasting + AS-REP roasting with hashcat-ready output
  • ADCS ESC1–ESC4 vulnerable certificate template detection
  • DCSync rights enumeration: who-can-sync audit
!scout# recon
!cred_kerberoast# SPN hash extraction
!lat_winrm SQLPROD → # lateral movement
!ca_enum# ADCS ESC1-ESC4 audit
ai report# CVSS v4.0 findings
User workstation → Domain Admin in documented steps

Ransomware Impact Demo (Executive Briefing)

Show management exactly what ransomware would encrypt on their own machines — without touching a single file. Dry-run mode lists every affected file first; the reversible encryption demo is undone with a single command.

  • Dry-run mode: shows affected files without modification
  • Reversible encryption demo — full rollback in seconds
  • Exfiltration simulation: shows what data would leave the network
  • More convincing than any slide deck — it's their own files
!audit --dryrun --tier smart # preview only
!backup --drive C --ext docx,xlsx,pdf # exfil scope
!audit decrypt <key> # full rollback
Management sees their own files listed as 'encrypted' — no actual damage done

Credential Exposure on a Single Workstation

How many credentials are extractable from a single average office machine without admin rights? The answer is usually 15–40. OMNI runs all extraction modules in sequence and catalogs every finding with LOOT markers.

  • Chrome/Edge/Brave v20 AES-GCM encryption bypass
  • DPAPI blob decryption — Credential Manager, RDP, generic
  • Azure AD / Teams / MSAL OAuth token harvest
  • AWS, Azure, GCP, Kubernetes, Terraform config sweep
  • WiFi WPA2-PSK, SSH keys, PuTTY, WinSCP, FileZilla
!cred_browser # Chrome/Edge v20 bypass
!cred_vault_credman # Windows Credential Manager
!cred_azure_token # Teams + MSAL tokens
!cred_cloud --sweep # .env, appsettings, k8s
!wifi # WPA2-PSK plaintext
Typically 15–40 unique credentials extracted from one workstation — no password required

EDR / AV Control Effectiveness Test

Your client runs XDR. Does it actually detect modern techniques? OMNI executes a controlled sequence of evasion techniques — AMSI bypass, ETW suppression, module stomping BOF execution, PPID spoofing — and you measure exactly what fired and what didn't.

  • AMSI bypass: AmsiScanBuffer in-process patch
  • ETW suppression: EtwEventWrite ntdll patch
  • BOF execution via module stomping (MEM_IMAGE, not MEM_PRIVATE)
  • PPID spoofing: process spawned under explorer.exe
  • Sleep obfuscation: XOR-encrypted memory during C2 sleep
!evade_amsi # disable scanner
!evade_etw # suppress telemetry
!bof whoami # module stomping execution
!evade_parent_spoof --parent explorer
!evade_sleep_obf # memory XOR during sleep
Exact gap list: which techniques the EDR detected, which ones didn't fire, and when

Network Segmentation & Pivot Test

The client believes their DMZ and office network are separated. OMNI proves or disproves it — deploying SOCKS5 proxies, port forwards, and agent-to-agent SMB relays to reach isolated segments without a direct internet connection.

  • SOCKS5 proxy: proxychains / Burp / Metasploit compatible
  • Port forwarding: reach internal targets through the agent
  • SMB Named Pipe relay: beacon internal hosts without internet
  • WinRM subnet scan: 30 parallel runspaces, /24 in seconds
!socks5 1080 # SOCKS5 proxy on agent
!pivot --fwd 8888 10.0.0.5 445 # port forward
!lat_winrm --scan 10.0.0.0/24 # parallel WinRM scan
!smb_pipe # offline agent relay
"From the DMZ we reached the production database server in 4 hops"

Persistence & Incident Response Test

The client 'cleaned up' after an incident. Did they get everything? OMNI installs multiple persistence mechanisms — WMI subscriptions, LSA SSP, service hijacking — and the IR team's job is to find them all.

  • WMI Event Subscription: invisible to filesystem scanners
  • LSA SSP DLL: intercepts cleartext credentials on every login
  • Service binary path hijacking: existing service, no new service created
  • !persist check enumerates all installed mechanisms for debrief
!persist_wmi --install # WMI subscription
!persist_lsa --inmem # LSA SSP in-memory
!persist_service --hijack SvcName
!persist check # enumerate all installed
Measurable: how many persistence points the IR team found, in how long

Privileged Access Management Audit

How hard is it to escalate from standard User to Admin/SYSTEM? OMNI's !privesc scanner checks every common path — UAC bypass, unquoted service paths, AlwaysInstallElevated, token theft — and confirms which vectors are exploitable in the current environment.

  • AlwaysInstallElevated policy detection
  • UAC bypass: wsreset + computerdefaults (no prompt)
  • SeImpersonatePrivilege → SYSTEM via Potato techniques
  • Unquoted service paths, writable service binaries
  • Token theft from running SYSTEM-level processes
!privesc # auto scanner
!priv_uac_wsreset # UAC bypass
!priv_potato --check # SeImpersonate?
!priv_token_theft --list # SYSTEM tokens
"On every tested machine we escalated from User to Admin within X minutes via: ..."

Cloud-Ready DevOps Workstation Audit

Developer machines carry cloud credentials. OMNI sweeps every known storage location — CLI configs, environment variables, IMDS endpoints, IaC state files — across AWS, Azure, GCP, Kubernetes, Terraform, and Docker.

  • AWS: ~/.aws/credentials, env vars, EC2 IMDS token
  • Azure: az-cli tokens, azureProfile.json, Azure IMDS
  • GCP: application_default_credentials.json, GCE metadata
  • Kubernetes: ~/.kube/config cluster token + cert
  • Terraform: tfstate resource attributes (plaintext passwords)
  • Code signing certs: PFX export with private key
!cred_cloud --aws # + EC2 IMDS
!cred_cloud --azure # + IMDS
!cred_cloud --terraform # tfstate sweep
!cred_cloud --k8s # kubeconfig
!cred_codesign --export # PFX + private key
"3 AWS access keys, 2 Azure refresh tokens, 1 Kubernetes cluster-admin cert found on one dev machine"

Every finding is reproducible, timestamped, and exportable.

OMNI's JSONL journal records every command and response with HMAC chaining — not 'we did it but can't prove it', but a concrete timestamped action log for every step.

View Pricing Talk to Sales