- Explore MCP Servers
- Hostile-Command-Suite
Hostile Command Suite
What is Hostile Command Suite
Hostile-Command-Suite is a comprehensive toolkit designed for automated penetration testing and Open Source Intelligence (OSINT) gathering, built as FastMCP micro-services.
Use cases
Use cases include automated vulnerability assessments, gathering intelligence on potential threats, and conducting research on individuals or organizations using OSINT techniques.
How to use
To use Hostile-Command-Suite, clone the repository from GitHub, run the installation script, and activate the virtual environment. Users can then utilize various OSINT tools provided within the suite.
Key features
Key features include a variety of OSINT tools for email, username, phone number intelligence, and custom search capabilities, as well as a PostgreSQL database for storing results.
Where to use
Hostile-Command-Suite can be used in cybersecurity, ethical hacking, and intelligence gathering fields, particularly for organizations needing to assess their security posture.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Overview
What is Hostile Command Suite
Hostile-Command-Suite is a comprehensive toolkit designed for automated penetration testing and Open Source Intelligence (OSINT) gathering, built as FastMCP micro-services.
Use cases
Use cases include automated vulnerability assessments, gathering intelligence on potential threats, and conducting research on individuals or organizations using OSINT techniques.
How to use
To use Hostile-Command-Suite, clone the repository from GitHub, run the installation script, and activate the virtual environment. Users can then utilize various OSINT tools provided within the suite.
Key features
Key features include a variety of OSINT tools for email, username, phone number intelligence, and custom search capabilities, as well as a PostgreSQL database for storing results.
Where to use
Hostile-Command-Suite can be used in cybersecurity, ethical hacking, and intelligence gathering fields, particularly for organizations needing to assess their security posture.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Content
/$$ /$$ /$$$$$$ /$$$$$$ | $$ | $$ /$$__ $$ /$$__ $$ | $$ | $$| $$ \__/| $$ \__/ | $$$$$$$$| $$ | $$$$$$ | $$__ $$| $$ \____ $$ | $$ | $$| $$ $$ /$$ \ $$ | $$ | $$| $$$$$$/| $$$$$$/ |__/ |__/ \______/ \______/
Hostile‑Command‑Suite
Author: cycloarcane
Contact: [email protected]
License: PolyForm Noncommercial License 1.0.0
A comprehensive OSINT and penetration testing toolkit built as FastMCP micro-services
🔥 Quick‑start
One-command install (Arch Linux)
git clone https://github.com/cycloarcane/Hostile-Command-Suite.git
cd Hostile-Command-Suite
chmod +x install_hcs.sh
./install_hcs.sh # grab coffee ☕
source .venv/bin/activate
Manual Install
# 1. Clone + create virtualenv
git clone https://github.com/cycloarcane/Hostile-Command-Suite.git
cd Hostile-Command-Suite
python -m venv .venv && source .venv/bin/activate && pip install --upgrade pip
# 2. Install Python dependencies
pip install -r requirements.txt
# 3. Install system tools (Arch Linux)
yay -S spiderfoot recon-ng phoneinfoga-bin mosint holehe sherlock-git nmap
# 4. Initialize database (optional)
bash scripts/database_init.sh
# 5. Configure API keys (see API Keys section below)
🛠️ Available Tools
OSINT Tools
Tool | Description | Status | API Keys Required |
---|---|---|---|
database_osint.py |
PostgreSQL storage for OSINT results | ✅ | PostgreSQL credentials |
email_osint.py |
Email OSINT (Mosint + Holehe + h8mail) | ✅ | Mosint config file |
username_osint.py |
Username search across platforms (Sherlock) | ✅ | None |
phone_osint.py |
Phone number intelligence (PhoneInfoga) | ✅ | None |
google_osint.py |
Google Custom Search with relevance scoring | ✅ | Google API + Search Engine ID |
duckduckgo_osint.py |
DuckDuckGo search with rate-limit resistance | ✅ | None |
shodan_osint.py |
IoT/device discovery and analysis | ✅ | Shodan API key |
domain_osint.py |
Domain and DNS reconnaissance | ✅ | Censys API (optional) |
certificate_osint.py |
SSL/TLS certificate analysis + CT monitoring | ✅ | Censys API (optional) |
geolocation_osint.py |
IP geolocation and geographical intelligence | ✅ | IPInfo API (optional) |
social_osint.py |
Social media intelligence gathering | ✅ | Multiple APIs (optional) |
crypto_osint.py |
Cryptocurrency address analysis | ✅ | Multiple APIs (optional) |
breach_osint.py |
Data breach and password compromise checking | ✅ | HIBP API (optional) |
metadata_osint.py |
File and image metadata extraction | ✅ | None |
link_follower_osint.py |
Web page content fetcher and parser | ✅ | None |
tiktok_osint.py |
TikTok comment and user analysis | ✅ | None |
PEN-TEST Tools
Tool | Description | Status | Requirements |
---|---|---|---|
nmap_ptest.py |
Network scanning and port discovery | ✅ | Nmap installed |
🔑 API Keys & Configuration
Required API Keys
Essential for core functionality:
# Database (Required for data storage)
export POSTGRES_DB=osint_db
export POSTGRES_USER=osint_user
export POSTGRES_PASSWORD=your_secure_password
export POSTGRES_HOST=localhost
export POSTGRES_PORT=5432
# Google Search API (Required for google_osint.py)
export GOOGLE_SEARCH_API_KEY=your_google_api_key
export GOOGLE_SEARCH_CX=your_search_engine_id
# Shodan API (Required for shodan_osint.py)
export SHODAN_API_KEY=your_shodan_api_key
Optional API Keys (Enhance functionality)
# Certificate/Domain Analysis
export CENSYS_API_ID=your_censys_id
export CENSYS_API_SECRET=your_censys_secret
# Geolocation
export IPINFO_API_KEY=your_ipinfo_key
export GEOIP_DB_PATH=/path/to/GeoLite2-City.mmdb
# Social Media Intelligence
export TWITTER_BEARER_TOKEN=your_twitter_token
export REDDIT_CLIENT_ID=your_reddit_id
export REDDIT_CLIENT_SECRET=your_reddit_secret
export GITHUB_TOKEN=your_github_token
# Cryptocurrency Analysis
export BLOCKCYPHER_API_KEY=your_blockcypher_key
export BLOCKCHAIN_INFO_API_KEY=your_blockchain_info_key
export OXT_API_KEY=your_oxt_key
# Breach Analysis
export HIBP_API_KEY=your_hibp_key
export DEHASHED_API_KEY=your_dehashed_key
Configuration Files
Mosint (~/.mosint.yaml
):
apikeys:
dehashed: "your_dehashed_api_key"
emailrep: "your_emailrep_key"
hunter: "your_hunter_key"
intelx: "your_intelx_key"
twitter:
consumer_key: "your_twitter_consumer_key"
consumer_secret: "your_twitter_consumer_secret"
bearer_token: "your_twitter_bearer_token"
Complete configuration details: See needed_variables.md
🚀 Usage Examples
As MCP Services (Claude Desktop/API)
Add to your Claude Desktop config or MCP client:
{
"mcpServers": {
"email": {
"command": ".venv/bin/python",
"args": [
"-u",
"OSINT/email_osint.py"
]
},
"shodan": {
"command": ".venv/bin/python",
"args": [
"-u",
"OSINT/shodan_osint.py"
]
}
}
}
Direct Command Line
# Email OSINT
python OSINT/email_osint.py
# Network reconnaissance
python OSINT/shodan_osint.py
# Social media intelligence
python OSINT/social_osint.py
# Certificate analysis
python OSINT/certificate_osint.py
Comprehensive Investigation Workflow
# 1. Start with email analysis
echo '{"method":"search_email_all","params":["[email protected]"]}' | python OSINT/email_osint.py
# 2. Username enumeration
echo '{"method":"search_username","params":["targetuser"]}' | python OSINT/username_osint.py
# 3. Domain reconnaissance
echo '{"method":"domain_intelligence","params":["example.com"]}' | python OSINT/domain_osint.py
# 4. Social media intelligence
echo '{"method":"comprehensive_social_analysis","params":["targetuser"]}' | python OSINT/social_osint.py
# 5. Store results in database
echo '{"method":"store_osint_data","params":["email","[email protected]","investigation","manual","findings",{"data":"results"}]}' | python OSINT/database_osint.py
🏗️ Architecture
Micro-service Design
Each tool is a standalone FastMCP service that can be:
- Used independently via command line
- Integrated with Claude Desktop/API
- Chained together for complex investigations
- Stored and retrieved via the database service
Data Flow
Target Input → OSINT Tools → Database Storage → Analysis & Reporting ↓ ↓ ↓ ↓ • Email • Email OSINT • PostgreSQL • Risk Analysis • Username • Social OSINT • JSON Store • Timeline • Domain • Domain OSINT • Metadata • Correlation • IP Address • Breach Check • Cache • Export
🎯 Tool Capabilities
Email Intelligence (email_osint.py
)
- Breach Detection: Mosint integration for comprehensive breach data
- Account Discovery: Holehe for social media account enumeration
- Password Analysis: h8mail for credential exposure
- Multi-source: Aggregates data from multiple OSINT sources
Username Intelligence (username_osint.py
)
- Platform Coverage: 400+ social media platforms via Sherlock
- Account Verification: Live verification of profile existence
- Bulk Processing: Efficient multi-username analysis
Phone Intelligence (phone_osint.py
)
- Carrier Information: PhoneInfoga integration
- Geographic Data: Location and region analysis
- Web Presence: Automated web search for phone mentions
- Concurrent Processing: Fast multi-source data gathering
Domain Intelligence (domain_osint.py
)
- WHOIS Analysis: Comprehensive domain registration data
- DNS Enumeration: A, AAAA, MX, NS, TXT, CNAME records
- Subdomain Discovery: Active and passive subdomain enumeration
- Certificate Transparency: SSL certificate history via CT logs
Certificate Intelligence (certificate_osint.py
)
- CT Log Monitoring: Real-time certificate transparency analysis
- SSL Analysis: Comprehensive certificate security assessment
- Subdomain Discovery: Certificate-based subdomain enumeration
- Change Detection: Monitor for new certificate issuances
Social Intelligence (social_osint.py
)
- Multi-platform: GitHub, Twitter, Reddit, Instagram, LinkedIn
- Profile Analysis: Automated data extraction and correlation
- Connection Mapping: Social network relationship analysis
- Activity Timeline: Historical activity pattern analysis
Cryptocurrency Intelligence (crypto_osint.py
)
- Address Analysis: Bitcoin and Ethereum address investigation
- Transaction Tracing: Money flow analysis and visualization
- Risk Assessment: Sanctions screening and risk scoring
- Blockchain Data: Real-time and historical transaction data
Search Intelligence (google_osint.py
+ duckduckgo_osint.py
)
- Relevance Scoring: AI-powered result ranking
- Rate Limit Bypass: Advanced techniques for sustained searching
- Caching System: Efficient result storage and retrieval
- Boolean Operators: Advanced search query construction
🔧 Development
Adding New Tools
- Create new tool:
OSINT/newtool_osint.py
- Inherit from FastMCP: Use the established pattern
- Add to config: Update
config.json
- Document: Update README and create usage examples
Tool Template
#!/usr/bin/env python3
from fastmcp import FastMCP
mcp = FastMCP("newtool")
@mcp.tool()
def your_function(param: str) -> dict:
return {"status": "success", "data": param}
if __name__ == "__main__":
mcp.run(transport="stdio")
🛡️ Security & Ethics
Responsible Use
- Legal Compliance: Ensure all activities comply with local laws
- Rate Limiting: Respect API limits and website ToS
- Data Protection: Secure storage of collected intelligence
- Permission: Only investigate targets you have authorization for
Privacy Considerations
- Data Minimization: Collect only necessary information
- Secure Storage: Use encrypted databases in production
- Access Control: Implement proper authentication
- Audit Logging: Track all investigative activities
🗂️ Repository Structure
Hostile-Command-Suite/ ├── OSINT/ # OSINT micro-services │ ├── breach_osint.py # Data breach checking (HIBP) │ ├── certificate_osint.py # SSL/TLS certificate analysis │ ├── crypto_osint.py # Cryptocurrency intelligence │ ├── database_osint.py # PostgreSQL data storage │ ├── domain_osint.py # Domain reconnaissance │ ├── duckduckgo_osint.py # DuckDuckGo search engine │ ├── email_osint.py # Email intelligence (Mosint/Holehe) │ ├── geolocation_osint.py # IP geolocation intelligence │ ├── google_osint.py # Google Custom Search │ ├── link_follower_osint.py # Web content analysis │ ├── metadata_osint.py # File metadata extraction │ ├── phone_osint.py # Phone number intelligence │ ├── shodan_osint.py # IoT/device discovery │ ├── social_osint.py # Social media intelligence │ ├── tiktok_osint.py # TikTok analysis │ └── username_osint.py # Username enumeration ├── PEN-TEST/ # Penetration testing tools │ └── nmap_ptest.py # Network scanning ├── scripts/ # Setup and utility scripts │ └── database_init.sh # Database initialization ├── knowledge_base/ # Documentation and references ├── config.json # MCP server configuration ├── requirements.txt # Python dependencies ├── install_hcs.sh # Automated installer ├── needed_variables.md # Complete API key guide └── README.md # This file
🤝 Contributing
- Fork → hack → pull request
- Follow
pre-commit
standards (black
,isort
,flake8
) - Add tests in
tests/
for new functionality - Sign commits:
git commit -s
- Documentation: Update README for new tools
Bug reports or feature ideas? Open an issue or email [email protected]
🗺️ Roadmap
Phase 1: Core OSINT (✅ Complete)
- [x] Email intelligence (Mosint, Holehe, h8mail)
- [x] Username enumeration (Sherlock)
- [x] Phone number analysis (PhoneInfoga)
- [x] Search engines (Google, DuckDuckGo)
- [x] Database storage (PostgreSQL)
Phase 2: Advanced Intelligence (✅ Complete)
- [x] Domain reconnaissance and DNS analysis
- [x] Certificate transparency monitoring
- [x] IP geolocation and network intelligence
- [x] Social media analysis and profiling
- [x] Cryptocurrency address analysis
- [x] Data breach and password compromise checking
- [x] File and image metadata extraction
Phase 3: Automation & Integration (🚧 In Progress)
- [ ] Automated investigation workflows
- [ ] Cross-tool data correlation
- [ ] Timeline analysis and visualization
- [ ] Report generation (PDF/HTML)
- [ ] REST API wrapper
- [ ] Web dashboard interface
Phase 4: Advanced Features (📋 Planned)
- [ ] Machine learning for pattern recognition
- [ ] Dark web monitoring capabilities
- [ ] Threat intelligence feed integration
- [ ] Mobile app analysis tools
- [ ] Container-based deployment (Docker)
- [ ] Distributed scanning capabilities
📊 Statistics
- 15 OSINT Tools across multiple intelligence domains
- 1 PEN-TEST Tool for network reconnaissance
- 25+ API Integrations for comprehensive data gathering
- PostgreSQL Storage for persistent investigation data
- FastMCP Architecture for modular, scalable design
Weaponise knowledge — ethically, of course.
For questions, feature requests, or commercial licensing inquiries, contact [email protected]
DevTools Supporting MCP
The following are the main code editors that support the Model Context Protocol. Click the link to visit the official website for more information.