PowerShell + C# Dual Agent —
One API, Maximum Compatibility
Two distinct agent implementations sharing the same 102-module API. Choose the PowerShell agent for legacy Windows environments down to Windows 7, or the C# .NET agent for modern systems with advanced evasion techniques. Switch between agents on the same host without changing your workflow — the same modules, the same commands, the same output format.
AMSI bypass · CLM bypass · Reflective loader
ETW patch · Syscall unhook · Sleep enc.
Evasion Techniques per Agent
- AMSI bypass (signature + patch methods)
- Constrained Language Mode bypass
- Reflective PowerShell loader
- Script block logging evasion
- Windows 7 / Server 2008 R2 compatible
- ETW (Event Tracing for Windows) patching
- Syscall unhooking (direct syscalls)
- Process hollowing loader
- Sleep encryption (Ekko + Foliage)
- Stack spoofing during sleep
Which Agent to Choose?
Use PowerShell when targeting legacy Windows environments (Win 7 / Server 2008-2012), mixed estates where .NET 4.8 is not guaranteed, or when a smaller initial footprint is preferred.
Use C# .NET when targeting modern Windows 10 / Server 2016+ systems, environments with strong EDR coverage requiring syscall-level evasion, or when sleep encryption is critical.
Explore Other Features
Use Dual Agents in your next engagement
Included in all OMNI plans — from $200/mo. 7-day money-back guarantee.
══════════════════════════════════════════════════════════════════
PS Agent C# Agent (reflective)
------------------------------------------------------------------
Script block logging visible bypassed
AMSI exposure via PS engine not applicable
Process name powershell.exe svchost.exe (migrated)
Memory footprint ~32 MB ~8 MB
Startup time 1.4s 0.3s
══════════════════════════════════════════════════════════════════
[OMNI]❯[DEMO]❯[CORP-WS-042]» !defender_check
[*] Waiting for defender_check response (Timeout: 30s)...
[+] DEFENDER_CHECK SUMMARY
════════════════════════════════════════
Real-Time Protection : ENABLED
AMSI Status : Patched (evade_amsi active)
Tamper Protection : True
Exclusion Paths : 3 entries found
ETW Status : Patched (evade_etw active)
└─ Saved: exfiltrated/CORP-WS-042/demo/defender/check_[demo].txt
[+] Command completed successfully
[OMNI]❯[DEMO]❯[CORP-WS-042]» !ping_sweep 10.10.20.0/24
[*] Waiting for ping_sweep response (Timeout: 300s)...
[+] PING SWEEP | Method: ICMP | Hosts: 254
Alive: 9 / 254 | Time: 2.1s
Alive IPs: 10.10.20.1, 10.10.20.5, 10.10.20.11, 10.10.20.22,
10.10.20.50, 10.10.20.100, 10.10.20.120, 10.10.20.200, 10.10.20.254
[+] Command completed successfully