/$$ /$$ /$$$$$$ /$$$$$$
| $$ | $$ /$$__ $$ /$$__ $$
| $$ | $$| $$ \__/| $$ \__/
| $$$$$$$$| $$ | $$$$$$
| $$__ $$| $$ \____ $$
| $$ | $$| $$ $$ /$$ \ $$
| $$ | $$| $$$$$$/| $$$$$$/
|__/ |__/ \______/ \______/
Author: cycloarcane
Contact: cycloarkane@gmail.com
License: PolyForm Noncommercial License 1.0.0
A comprehensive OSINT and penetration testing toolkit built as FastMCP micro-services
git clone https://github.com/cycloarcane/Hostile-Command-Suite.git
cd Hostile-Command-Suite
chmod +x install_hcs.sh
./install_hcs.sh # grab coffee β
source .venv/bin/activate
# 1. Clone + create virtualenv
git clone https://github.com/cycloarcane/Hostile-Command-Suite.git
cd Hostile-Command-Suite
python -m venv .venv && source .venv/bin/activate && pip install --upgrade pip
# 2. Install Python dependencies
pip install -r requirements.txt
# 3. Install system tools (Arch Linux)
yay -S spiderfoot recon-ng phoneinfoga-bin mosint holehe sherlock-git nmap
# 4. Initialize database (optional)
bash scripts/database_init.sh
# 5. Configure API keys (see API Keys section below)
Tool | Description | Status | API Keys Required |
---|---|---|---|
database_osint.py |
PostgreSQL storage for OSINT results | β | PostgreSQL credentials |
email_osint.py |
Email OSINT (Mosint + Holehe + h8mail) | β | Mosint config file |
username_osint.py |
Username search across platforms (Sherlock) | β | None |
phone_osint.py |
Phone number intelligence (PhoneInfoga) | β | None |
google_osint.py |
Google Custom Search with relevance scoring | β | Google API + Search Engine ID |
duckduckgo_osint.py |
DuckDuckGo search with rate-limit resistance | β | None |
shodan_osint.py |
IoT/device discovery and analysis | β | Shodan API key |
domain_osint.py |
Domain and DNS reconnaissance | β | Censys API (optional) |
certificate_osint.py |
SSL/TLS certificate analysis + CT monitoring | β | Censys API (optional) |
geolocation_osint.py |
IP geolocation and geographical intelligence | β | IPInfo API (optional) |
social_osint.py |
Social media intelligence gathering | β | Multiple APIs (optional) |
crypto_osint.py |
Cryptocurrency address analysis | β | Multiple APIs (optional) |
breach_osint.py |
Data breach and password compromise checking | β | HIBP API (optional) |
metadata_osint.py |
File and image metadata extraction | β | None |
link_follower_osint.py |
Web page content fetcher and parser | β | None |
tiktok_osint.py |
TikTok comment and user analysis | β | None |
Tool | Description | Status | Requirements |
---|---|---|---|
nmap_ptest.py |
Network scanning and port discovery | β | Nmap installed |
Essential for core functionality:
# Database (Required for data storage)
export POSTGRES_DB=osint_db
export POSTGRES_USER=osint_user
export POSTGRES_PASSWORD=your_secure_password
export POSTGRES_HOST=localhost
export POSTGRES_PORT=5432
# Google Search API (Required for google_osint.py)
export GOOGLE_SEARCH_API_KEY=your_google_api_key
export GOOGLE_SEARCH_CX=your_search_engine_id
# Shodan API (Required for shodan_osint.py)
export SHODAN_API_KEY=your_shodan_api_key
# Certificate/Domain Analysis
export CENSYS_API_ID=your_censys_id
export CENSYS_API_SECRET=your_censys_secret
# Geolocation
export IPINFO_API_KEY=your_ipinfo_key
export GEOIP_DB_PATH=/path/to/GeoLite2-City.mmdb
# Social Media Intelligence
export TWITTER_BEARER_TOKEN=your_twitter_token
export REDDIT_CLIENT_ID=your_reddit_id
export REDDIT_CLIENT_SECRET=your_reddit_secret
export GITHUB_TOKEN=your_github_token
# Cryptocurrency Analysis
export BLOCKCYPHER_API_KEY=your_blockcypher_key
export BLOCKCHAIN_INFO_API_KEY=your_blockchain_info_key
export OXT_API_KEY=your_oxt_key
# Breach Analysis
export HIBP_API_KEY=your_hibp_key
export DEHASHED_API_KEY=your_dehashed_key
Mosint (~/.mosint.yaml
):
apikeys:
dehashed: "your_dehashed_api_key"
emailrep: "your_emailrep_key"
hunter: "your_hunter_key"
intelx: "your_intelx_key"
twitter:
consumer_key: "your_twitter_consumer_key"
consumer_secret: "your_twitter_consumer_secret"
bearer_token: "your_twitter_bearer_token"
Complete configuration details: See needed_variables.md
Add to your Claude Desktop config or MCP client:
{
"mcpServers": {
"email": {
"command": ".venv/bin/python",
"args": ["-u", "OSINT/email_osint.py"]
},
"shodan": {
"command": ".venv/bin/python",
"args": ["-u", "OSINT/shodan_osint.py"]
}
}
}
# Email OSINT
python OSINT/email_osint.py
# Network reconnaissance
python OSINT/shodan_osint.py
# Social media intelligence
python OSINT/social_osint.py
# Certificate analysis
python OSINT/certificate_osint.py
# 1. Start with email analysis
echo '{"method":"search_email_all","params":["target@example.com"]}' | python OSINT/email_osint.py
# 2. Username enumeration
echo '{"method":"search_username","params":["targetuser"]}' | python OSINT/username_osint.py
# 3. Domain reconnaissance
echo '{"method":"domain_intelligence","params":["example.com"]}' | python OSINT/domain_osint.py
# 4. Social media intelligence
echo '{"method":"comprehensive_social_analysis","params":["targetuser"]}' | python OSINT/social_osint.py
# 5. Store results in database
echo '{"method":"store_osint_data","params":["email","target@example.com","investigation","manual","findings",{"data":"results"}]}' | python OSINT/database_osint.py
Each tool is a standalone FastMCP service that can be:
- Used independently via command line
- Integrated with Claude Desktop/API
- Chained together for complex investigations
- Stored and retrieved via the database service
Target Input β OSINT Tools β Database Storage β Analysis & Reporting
β β β β
β’ Email β’ Email OSINT β’ PostgreSQL β’ Risk Analysis
β’ Username β’ Social OSINT β’ JSON Store β’ Timeline
β’ Domain β’ Domain OSINT β’ Metadata β’ Correlation
β’ IP Address β’ Breach Check β’ Cache β’ Export
- Breach Detection: Mosint integration for comprehensive breach data
- Account Discovery: Holehe for social media account enumeration
- Password Analysis: h8mail for credential exposure
- Multi-source: Aggregates data from multiple OSINT sources
- Platform Coverage: 400+ social media platforms via Sherlock
- Account Verification: Live verification of profile existence
- Bulk Processing: Efficient multi-username analysis
- Carrier Information: PhoneInfoga integration
- Geographic Data: Location and region analysis
- Web Presence: Automated web search for phone mentions
- Concurrent Processing: Fast multi-source data gathering
- WHOIS Analysis: Comprehensive domain registration data
- DNS Enumeration: A, AAAA, MX, NS, TXT, CNAME records
- Subdomain Discovery: Active and passive subdomain enumeration
- Certificate Transparency: SSL certificate history via CT logs
- CT Log Monitoring: Real-time certificate transparency analysis
- SSL Analysis: Comprehensive certificate security assessment
- Subdomain Discovery: Certificate-based subdomain enumeration
- Change Detection: Monitor for new certificate issuances
- Multi-platform: GitHub, Twitter, Reddit, Instagram, LinkedIn
- Profile Analysis: Automated data extraction and correlation
- Connection Mapping: Social network relationship analysis
- Activity Timeline: Historical activity pattern analysis
- Address Analysis: Bitcoin and Ethereum address investigation
- Transaction Tracing: Money flow analysis and visualization
- Risk Assessment: Sanctions screening and risk scoring
- Blockchain Data: Real-time and historical transaction data
- Relevance Scoring: AI-powered result ranking
- Rate Limit Bypass: Advanced techniques for sustained searching
- Caching System: Efficient result storage and retrieval
- Boolean Operators: Advanced search query construction
- Create new tool:
OSINT/newtool_osint.py
- Inherit from FastMCP: Use the established pattern
- Add to config: Update
config.json
- Document: Update README and create usage examples
#!/usr/bin/env python3
from fastmcp import FastMCP
mcp = FastMCP("newtool")
@mcp.tool()
def your_function(param: str) -> dict:
return {"status": "success", "data": param}
if __name__ == "__main__":
mcp.run(transport="stdio")
- Legal Compliance: Ensure all activities comply with local laws
- Rate Limiting: Respect API limits and website ToS
- Data Protection: Secure storage of collected intelligence
- Permission: Only investigate targets you have authorization for
- Data Minimization: Collect only necessary information
- Secure Storage: Use encrypted databases in production
- Access Control: Implement proper authentication
- Audit Logging: Track all investigative activities
Hostile-Command-Suite/
βββ OSINT/ # OSINT micro-services
β βββ breach_osint.py # Data breach checking (HIBP)
β βββ certificate_osint.py # SSL/TLS certificate analysis
β βββ crypto_osint.py # Cryptocurrency intelligence
β βββ database_osint.py # PostgreSQL data storage
β βββ domain_osint.py # Domain reconnaissance
β βββ duckduckgo_osint.py # DuckDuckGo search engine
β βββ email_osint.py # Email intelligence (Mosint/Holehe)
β βββ geolocation_osint.py # IP geolocation intelligence
β βββ google_osint.py # Google Custom Search
β βββ link_follower_osint.py # Web content analysis
β βββ metadata_osint.py # File metadata extraction
β βββ phone_osint.py # Phone number intelligence
β βββ shodan_osint.py # IoT/device discovery
β βββ social_osint.py # Social media intelligence
β βββ tiktok_osint.py # TikTok analysis
β βββ username_osint.py # Username enumeration
βββ PEN-TEST/ # Penetration testing tools
β βββ nmap_ptest.py # Network scanning
βββ scripts/ # Setup and utility scripts
β βββ database_init.sh # Database initialization
βββ knowledge_base/ # Documentation and references
βββ config.json # MCP server configuration
βββ requirements.txt # Python dependencies
βββ install_hcs.sh # Automated installer
βββ needed_variables.md # Complete API key guide
βββ README.md # This file
- Fork β hack β pull request
- Follow
pre-commit
standards (black
,isort
,flake8
) - Add tests in
tests/
for new functionality - Sign commits:
git commit -s
- Documentation: Update README for new tools
Bug reports or feature ideas? Open an issue or email cycloarkane@gmail.com
- Email intelligence (Mosint, Holehe, h8mail)
- Username enumeration (Sherlock)
- Phone number analysis (PhoneInfoga)
- Search engines (Google, DuckDuckGo)
- Database storage (PostgreSQL)
- Domain reconnaissance and DNS analysis
- Certificate transparency monitoring
- IP geolocation and network intelligence
- Social media analysis and profiling
- Cryptocurrency address analysis
- Data breach and password compromise checking
- File and image metadata extraction
- Automated investigation workflows
- Cross-tool data correlation
- Timeline analysis and visualization
- Report generation (PDF/HTML)
- REST API wrapper
- Web dashboard interface
- Machine learning for pattern recognition
- Dark web monitoring capabilities
- Threat intelligence feed integration
- Mobile app analysis tools
- Container-based deployment (Docker)
- Distributed scanning capabilities
- 15 OSINT Tools across multiple intelligence domains
- 1 PEN-TEST Tool for network reconnaissance
- 25+ API Integrations for comprehensive data gathering
- PostgreSQL Storage for persistent investigation data
- FastMCP Architecture for modular, scalable design
Weaponise knowledge β ethically, of course.
For questions, feature requests, or commercial licensing inquiries, contact cycloarkane@gmail.com