Skip to main content

Intelligent OSINT investigation system with MCP tools

Project description

Hostile Command Suite - OSINT Package

Author: cycloarcane
Contact: cycloarkane@gmail.com
License: PolyForm Noncommercial License 1.0.0

Intelligent Open Source Intelligence Investigation System

A terminal-based OSINT investigation framework with AI-powered analysis and intelligent agent decision-making. Features automated profile scraping, multi-platform username investigation, and local LLM integration for enhanced intelligence gathering.


๐Ÿš€ Quick Start

Prerequisites

  1. Install ollama (for AI analysis):
curl -fsSL https://ollama.ai/install.sh | sh
ollama pull qwen3:8b  # recommended model
  1. Install OSINT tools:
# Arch Linux
yay -S sherlock-git mosint

# Ubuntu/Debian  
pip install sherlock-project
# For mosint, download from: https://github.com/alpkeskin/mosint

Installation

git clone https://github.com/cycloarcane/Hostile-Command-Suite.git
cd Hostile-Command-Suite
python -m venv .venv
source .venv/bin/activate  # Linux/Mac
pip install -r requirements.txt

Usage

Interactive comprehensive investigation:

python3 HCSO.py --interactive
# Then provide ALL target information: names, usernames, emails, addresses, etc.

Command line investigation:

# Single targets (backward compatibility)
python3 HCSO.py cycloarcane
python3 HCSO.py user@example.com

# Comprehensive targets (multiple data points)
python3 HCSO.py "John Smith, @johnsmith123, john@example.com, works at Acme Corp"
python3 HCSO.py --model llama3.2 "Jane Doe jane.doe@company.com https://linkedin.com/in/janedoe"

๐Ÿ› ๏ธ Features

Core Capabilities

  • ๐Ÿ” Username Investigation: Sherlock integration across 400+ social media platforms
  • ๐Ÿ“ง Email Investigation: Mosint integration for email intelligence and breach analysis
  • ๐ŸŒ Profile Scraping: Automated extraction of profile details from discovered accounts
  • ๐Ÿ” Web Search Intelligence: DuckDuckGo search integration for comprehensive OSINT gathering
  • ๐Ÿค– AI Agent: Local ollama integration for intelligent decision-making and analysis
  • โšก Intelligent Workflow: Automatic tool chaining and investigation pivoting
  • ๐ŸŽจ Rich Terminal: Professional red/black themed interface with progress indicators

Supported Targets

Target Type Primary Tool Secondary Tools AI Analysis
Username Sherlock โ†’ Profile Scraper DuckDuckGo Search, Link Analyzer โœ… Full Analysis
Email Mosint DuckDuckGo Search โœ… Full Analysis
Any Target DuckDuckGo Search Context-dependent pivoting โœ… Full Analysis

MCP Tool Architecture

The system uses Model Context Protocol (MCP) based tool servers:

  • sherlock_server.py: Username investigation across platforms
  • mosint_server.py: Email enumeration and breach investigation
  • profile_scraper_server.py: Intelligent profile content extraction
  • duckduckgo_server.py: Web search for comprehensive intelligence gathering
  • link_analyzer_server.py: Deep analysis of URLs and GitHub profiles

AI-Powered Intelligence

The AI agent provides:

  • Comprehensive Data Extraction: Uses LLM to parse and categorize all provided target information
  • Intelligent Tool Selection: Automatically chooses appropriate tools based on data types:
    • Names โ†’ DuckDuckGo web search for public records and news
    • Usernames โ†’ Sherlock for social media platform discovery
    • Emails โ†’ Mosint for breach data and domain analysis
    • Organizations โ†’ Web search for corporate intelligence
    • URLs โ†’ Link analyzer for deep content analysis
  • Investigation Pivoting: Discovers new leads and suggests follow-up actions
  • Security Risk Assessment: Evaluates exposure levels and security implications
  • Pattern Recognition: Identifies connections across platforms and data sources
  • Decision Making: Determines when investigations are complete vs need continuation

๐Ÿ—๏ธ Architecture

Intelligent Agent Design

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚   HCSO Agent    โ”‚โ”€โ”€โ–ถโ”‚  Ollama AI       โ”‚โ”€โ”€โ”€โ–ถโ”‚ Investigation   โ”‚
โ”‚                 โ”‚    โ”‚  Decision Engine โ”‚    โ”‚ Recommendations โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
         โ”‚
         โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚ MCP Tool        โ”‚โ”€โ”€โ–ถโ”‚  Tool Results    โ”‚โ”€โ”€โ”€โ–ถโ”‚ Profile Scraper โ”‚
โ”‚ Manager         โ”‚    โ”‚  Analysis        โ”‚    โ”‚ Auto-Trigger    โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
         โ”‚
         โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚ Sherlock        โ”‚    โ”‚ Mosint           โ”‚    โ”‚ Profile         โ”‚
โ”‚ Username Search โ”‚    โ”‚ Email Intel      โ”‚    โ”‚ Scraper         โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

Investigation Workflow

  1. Comprehensive Input: User provides ALL available target information (names, usernames, emails, addresses, organizations, URLs, etc.)
  2. AI Data Extraction: LLM parses and categorizes information into structured data types
  3. Intelligent Tool Selection: System automatically selects appropriate tools for each data type:
    • Names โ†’ Web search for public intelligence
    • Usernames โ†’ Social media platform discovery
    • Emails โ†’ Breach analysis and domain intelligence
    • Organizations โ†’ Corporate and public records search
    • URLs โ†’ Deep content and profile analysis
  4. Parallel Investigation: Multiple tools execute simultaneously based on extracted data
  5. AI Analysis: Intelligent analysis of all findings and cross-reference discovery
  6. Decision Point: AI recommends additional investigations or marks complete
  7. Iterative Enhancement: Follow-up investigations based on discovered leads

๐Ÿ“Š Example Output

  โ•”โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•—
  โ•‘  โ–ˆโ–ˆ   โ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ         โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ  โ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ  โ•‘
  โ•‘  โ–ˆโ–ˆ   โ–ˆโ–ˆ โ–ˆโ–ˆ      โ–ˆโ–ˆ             โ–ˆโ–ˆ   โ–ˆโ–ˆ โ–ˆโ–ˆ       โ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆโ–ˆ   โ–ˆโ–ˆ    โ–ˆโ–ˆ     โ•‘
  โ•‘  โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆ      โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ  โ–ˆโ–ˆ   โ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ  โ–ˆโ–ˆ โ–ˆโ–ˆ โ–ˆโ–ˆ  โ–ˆโ–ˆ    โ–ˆโ–ˆ     โ•‘
  โ•‘  โ–ˆโ–ˆ   โ–ˆโ–ˆ      โ–ˆโ–ˆ โ–ˆโ–ˆ             โ–ˆโ–ˆ   โ–ˆโ–ˆ      โ–ˆโ–ˆ  โ–ˆโ–ˆ โ–ˆโ–ˆ  โ–ˆโ–ˆ โ–ˆโ–ˆ    โ–ˆโ–ˆ     โ•‘
  โ•‘  โ–ˆโ–ˆ   โ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ         โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ  โ–ˆโ–ˆ โ–ˆโ–ˆ   โ–ˆโ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆ     โ•‘
  โ•šโ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

      Hostile Command Suite - OSINT Package
      Intelligent Open Source Intelligence Investigation System

  Using AI Model: qwen3:8b
  Available Tools: sherlock, mosint, profile_scraper, duckduckgo_search, link_analyzer

  โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€

  โ•โ•โ• COMPREHENSIVE TARGET INFORMATION โ•โ•โ•
  Provide ALL available information about your target for intelligent analysis
  Include: names, usernames, emails, addresses, organizations, social profiles, etc.

  Enter ALL target information: John Smith, @johnsmith123, john.smith@techcorp.com, works at TechCorp

  Analyzing Provided Information
  โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€

   Extracted Target Intelligence 
  โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ณโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”“
  โ”ƒ Data Type      โ”ƒ Extracted Values                                                  โ”ƒ
  โ”กโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ•‡โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ฉ
  โ”‚ Names          โ”‚ John Smith                                                        โ”‚
  โ”‚ Usernames      โ”‚ johnsmith123                                                      โ”‚
  โ”‚ Emails         โ”‚ john.smith@techcorp.com                                           โ”‚
  โ”‚ Organizations  โ”‚ TechCorp                                                          โ”‚
  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
  โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€

  Investigating Name: John Smith

   SHERLOCK Investigation Results 
  โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ณโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”“
  โ”ƒ Metric         โ”ƒ Value       โ”ƒ
  โ”กโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ•‡โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ฉ
  โ”‚ Target         โ”‚ cycloarcane โ”‚
  โ”‚ Accounts Found โ”‚ 17          โ”‚
  โ”‚ Status         โ”‚ Success     โ”‚
  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
  โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€

  Found 17 profiles, scraping for additional intelligence...
  PROFILE_SCRAPER Investigation Results
  โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ณโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”“
  โ”ƒ Metric           โ”ƒ Value   โ”ƒ
  โ”กโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ•‡โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ฉ
  โ”‚ Total Scraped    โ”‚ 5       โ”‚
  โ”‚ Successful       โ”‚ 4       โ”‚
  โ”‚ With Useful Info โ”‚ 4       โ”‚
  โ”‚ Status           โ”‚ Success โ”‚
  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
  โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€

  AI Agent Analyzing...
  โ•ญโ”€ AI Investigation Analysis โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฎ
  โ”‚ ANALYSIS: Investigation revealed GitHub profile with security research    โ”‚
  โ”‚ interests (LLMs + red team). High-value intelligence gathered from        โ”‚
  โ”‚ multiple platforms. Profile scraping provided sufficient context.        โ”‚
  โ”‚                                                                           โ”‚
  โ”‚ RECOMMENDATION: Investigation complete - sufficient intelligence gathered โ”‚
  โ”‚ TOOL: NONE                                                                โ”‚
  โ”‚ TARGET: N/A                                                               โ”‚
  โ”‚ REASONING: Profile analysis reveals technical expertise and security      โ”‚
  โ”‚ focus. No additional tools needed for current investigation scope.        โ”‚
  โ•ฐโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฏ

๐Ÿ›ก๏ธ Security & Ethics

Responsible Use

  • Legal Compliance: All investigations must comply with applicable laws
  • Authorization: Only investigate targets you have permission to research
  • Rate Limiting: Respects platform rate limits and implements delays
  • Local Processing: All AI analysis happens locally via ollama (no cloud)

Privacy & Security

  • No Data Persistence: Investigation results are not stored long-term
  • Local LLM: AI analysis never leaves your machine
  • Tool Isolation: Each OSINT tool runs independently
  • Professional Focus: Designed for defensive security and legitimate research

๐Ÿ”ง Configuration

AI Model Selection

# Use different ollama models
python3 HCSO.py --model llama3.2 target
python3 HCSO.py --model qwen3:8b target
python3 HCSO.py --model mixtral target

Configurable Prompts

Agent behavior is configurable via YAML files:

  • prompts/agent_system.yaml: Core agent instructions and tool selection logic
  • prompts/tool_prompts.yaml: Tool-specific analysis templates

Tool Capabilities

Tool Input Capabilities Auto-Trigger
DuckDuckGo Search Names, Organizations Web intelligence, news, public records Auto for names
Sherlock Username 400+ platform search Auto for usernames
Mosint Email Breach data, domain intel Auto for emails
Link Analyzer URLs GitHub profiles, web content analysis Auto for URLs
Profile Scraper URLs Bio, followers, verification After Sherlock

๐Ÿšง Development

Adding New OSINT Tools

  1. Create MCP server in mcp_tools/new_tool_server.py
  2. Add tool detection in MCPToolManager.check_available_tools()
  3. Implement tool calling in MCPToolManager.call_tool()
  4. Add result display in display_investigation_result()
  5. Update agent prompts for tool selection logic

Architecture Benefits

Previous Complex Architecture:

  • 15+ microservices with FastMCP
  • PostgreSQL database requirement
  • Web UI and API complexity
  • Multiple authentication layers

Current Intelligent Agent Architecture:

  • Single intelligent agent with MCP tools
  • No database required
  • Pure terminal interface with AI
  • Local ollama for decision-making
  • Automatic tool chaining and pivoting

๐Ÿ“ˆ Roadmap

Phase 1: Core Intelligence โœ…

  • Sherlock username investigation with AI analysis
  • Mosint email investigation with AI analysis
  • Intelligent profile scraping from social media
  • AI-powered investigation decision making
  • MCP-based tool architecture

Phase 2: Enhanced Analysis ๐Ÿšง

  • Link analyzer for deep GitHub/social media analysis
  • Domain investigation capabilities
  • Phone number OSINT integration
  • Correlation analysis across findings

Phase 3: Advanced Intelligence ๐Ÿ“‹

  • Investigation session management
  • Custom tool integration framework
  • Automated investigation workflows
  • Advanced AI reasoning and pivoting

๐Ÿค Contributing

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/new-tool)
  3. Add your MCP tool server following existing patterns
  4. Update agent prompts for tool integration
  5. Test with various target types
  6. Submit a pull request

Development Setup

git clone https://github.com/cycloarcane/Hostile-Command-Suite.git
cd Hostile-Command-Suite
python -m venv .venv
source .venv/bin/activate
pip install -r requirements.txt
python3 HCSO.py --interactive

๐Ÿ“„ License

This project is licensed under the PolyForm Noncommercial License 1.0.0 - see the LICENSE file for details.

Copyright ยฉ cycloarcane (cycloarkane@gmail.com)


Intelligent. Terminal. Effective.

Advanced OSINT investigation with AI-powered decision making

For questions or feature requests, contact cycloarkane@gmail.com

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file iflow_mcp_cycloarcane_hostile_command_suite-0.1.3.tar.gz.

File metadata

  • Download URL: iflow_mcp_cycloarcane_hostile_command_suite-0.1.3.tar.gz
  • Upload date:
  • Size: 21.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_cycloarcane_hostile_command_suite-0.1.3.tar.gz
Algorithm Hash digest
SHA256 45a0308f5e59413f8301ef76b1705856d4ddad11e9189d9cb8e4117b9ca08bc6
MD5 b5386313b6150e93c83b8b2302f57c2b
BLAKE2b-256 87e3d18568b8ba145a785365630010d453aba3fa47c0e003876393078f16e6d8

See more details on using hashes here.

File details

Details for the file iflow_mcp_cycloarcane_hostile_command_suite-0.1.3-py3-none-any.whl.

File metadata

  • Download URL: iflow_mcp_cycloarcane_hostile_command_suite-0.1.3-py3-none-any.whl
  • Upload date:
  • Size: 25.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_cycloarcane_hostile_command_suite-0.1.3-py3-none-any.whl
Algorithm Hash digest
SHA256 fc7576f5a93f80ca683e76895bb0e49d498f5cbd000ab7e69d0271b0590bf499
MD5 3b03c5a9028f670841bcb744cd66d41b
BLAKE2b-256 e473d04c5704f12de1721c013450ba9ddc09e30182a190fee02c61225e14e4ad

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page