Hostile-Command-Suite logo

Hostile-Command-Suite

by cycloarcane

Hostile-Command-Suite (HCS) is an extensible set of command-line micro-services for open-source intelligence and penetration-testing workflows. Each tool is wrapped in a fastMCP façade so a chatbot (or any JSON-RPC client) can drive it securely and receive structured JSON back.

View on GitHub

Last updated: N/A

██╗  ██╗ ██████╗███████╗
██║  ██║██╔════╝██╔════╝
███████║██║     ███████╗
██╔══██║██║     ╚════██║
██║  ██║╚██████╗███████║
╚═╝  ╚═╝ ╚═════╝╚══════╝

Hostile‑Command‑Suite

Author: cycloarcane Contact: [email protected] License: PolyForm Noncommercial License 1.0.0

Hostile‑Command‑Suite (HCS) is an extensible set of command‑line micro‑services (MCP servers) for open‑source intelligence and—soon—penetration‑testing workflows. Each tool is wrapped in a fastMCP façade so a chatbot (or any JSON‑RPC client) can drive it securely and receive structured JSON back. Postgres stores every result so no clue is lost.


Repo Layout

Hostile-Command-Suite/
├── OSINT/                 # finished micro‑services + config
│   ├── config.json        # MCP server manifest
│   ├── db_schema.sql      # CREATE TABLE osint_results ...
│   ├── email_osint.py     # Mosint / Holehe / h8mail aggregator
│   ├── phone_osint.py     # PhoneInfoga wrapper
│   └── username_osint.py  # Sherlock wrapper
├── PEN-TEST/              # ✨ reserved: coming soon
└── README.md              # you are here

Quick‑start

For email_osint you need to make a .mosint.yaml file in your home directory with mosint's config (see Mosint docs).

🔥 One-command install

If you just want everything set up in one go, clone the repo and run the bundling script:

git clone https://github.com/cycloarcane/Hostile-Command-Suite.git
cd Hostile-Command-Suite
chmod +x install_hcs.sh   # already in the repo root
./install_hcs.sh          # grab coffee ☕

install_hcs.sh will:

  1. Update the system and install core build/runtime packages.
  2. Install yay if missing, then pull every AUR tool HCS needs.
  3. Initialise PostgreSQL, create the osint_user/osint_db combo, and start the service.
  4. Set up a project-local Python virtualenv with all pip dependencies.
  5. Clone GHunt and install its requirements.

After it finishes, load the DSN and activate the venv:

export OSINT_PG_DSN="dbname=osint_db user=osint_user password=changeme host=/var/run/postgresql"
source .venv/bin/activate

You’re now ready to launch any MCP wrapper (e.g. python OSINT/email_osint.py) or plug the suite straight into your chatbot.

Manual Install

# 0. Arch prerequisites (base + yay assumed)
sudo pacman -Syu --needed base-devel git python python-pip python-virtualenv postgresql

# 1. Clone + create virtualenv
 git clone https://github.com/cycloarcane/Hostile-Command-Suite.git
 cd Hostile-Command-Suite
 python -m venv .venv && source .venv/bin/activate && pip install --upgrade pip

# 2. Install Postgres + schema
 sudo -iu postgres initdb -D /var/lib/postgres/data
 sudo systemctl enable --now postgresql
 sudo -iu postgres psql -c "CREATE ROLE osint_user LOGIN PASSWORD 'changeme';"
 sudo -iu postgres createdb -O osint_user osint_db
 psql -U osint_user -d osint_db -f OSINT/db_schema.sql

# 3. Grab toolchain (AUR helpers shown; swap for paru/pikaur if you like)
 yay -S spiderfoot recon-ng-git phoneinfoga-bin theharvester mosint holehe sherlock-git osintgram twint
 pip install h8mail instaloader social-analyzer
 git clone https://github.com/mxrch/GHunt ~/GHunt && pip install -r ~/GHunt/requirements.txt

# 4. Export DSN (or use .pgpass / peer auth)
 export OSINT_PG_DSN="dbname=osint_db user=osint_user password=changeme host=/var/run/postgresql"

# 5. Launch a tool (stdin JSON‑RPC)
echo '{"method":"mosint","params":["[email protected]"]}' | \
      .venv/bin/python OSINT/email_osint.py

API‑Key Matrix

| Tool | Key required to run? | Key file / env var | What you miss without it | | ------------------- | ------------------------ | ----------------------------------------- | ------------------------ | | Twint | No | — | Nothing; full scrape | | SpiderFoot | Optional per‑module | ~/.spiderfoot.conf | Extra data sources | | Recon‑ng | Optional per‑module | keys add <module> <key> | Extra data modules | | PhoneInfoga | Optional | ~/.config/phoneinfoga/config.yaml | Carrier & spam enrich | | theHarvester | Optional | ~/.theHarvester/api-keys.yaml | Bing/Hunter results | | Mosint | Yes (full run) | ~/.mosint.yaml | Breach/social lookups | | Holehe | No | — | — | | h8mail | Optional | h8mail_config.ini or -k env | Deep breach content | | Sherlock | No | — | — | | Social‑Analyzer | Optional | --google_key / REST settings endpoint | OCR + AI ranking | | Instaloader | No | Instagram login only for private profiles | — | | Osintgram | IG creds (no API key) | credentials.ini | Needs login at all | | GHunt | Google cookies | config file with SID, LSID, HSID | Script won’t run |

Tip: keep secrets in 600‑perm dot‑files or systemd LoadCredential= so wrappers never embed them in code.


Implemented vs TODO

| Wrapper script | Status | | -------------------- | ------------------------------------------------ | | email_osint.py | ✅ ready (Mosint + Holehe + h8mail) | | username_osint.py | ✅ ready (Sherlock) | | phone_osint.py | ✅ ready (PhoneInfoga) | | twitter_osint.py | ❌ planned (Twint timeline + followers) | | social_osint.py | ❌ planned (Osintgram + Instaloader) | | google_osint.py | ❌ planned (GHunt wrapper) | | footprint_osint.py | ❌ planned (SpiderFoot / Recon‑ng orchestrator) | | PEN-TEST/* | 🚧 (Metasploit, Nuclei, etc. to be added) |

PRs welcome—especially if you add a new wrapper with tests + DB storage!


Contributing

  1. Fork ▸ hack ▸ pull request.
  2. Stick to pre-commit lint rules (black, isort, flake8).
  3. Add a unit‑test in tests/ if you add logic.
  4. Sign off your commits (git commit -s).

Bug reports or feature ideas? Open an issue or mail [email protected].


Roadmap

  • [ ] Finish wrappers marked ❌ and wire them into OSINT/config.json.
  • [ ] Add PEN-TEST micro‑services (nmap, nuclei, feroxbuster, etc.).
  • [ ] Docker‑compose for one‑command bring‑up.
  • [ ] Web dashboard (React + FastAPI) to browse stored OSINT artefacts.

weaponise knowledge - ethically, of course.

Hostile-Command-Suite - MCP Server | MCP Directory