Library

Centralized reference for PhanesGuild Software LLC products. Select a product below or scroll.

Systems Architecture Program

Future-ready tech education from foundations to advanced systems.

Overview

The Systems Architecture Program is a hands-on learning experience for students who want to build systems, not just use them. From Linux and cybersecurity to full-stack development, AI, and robotics—students become builders, creators, and defenders of modern technology.

Led by Eugene T. Wells, Founder & Lead Systems Architect at PhanesGuild Software LLC, this program provides industry-grade training with small class sizes for true mentorship.

Program Structure

⚠️ Important: Tiers must be taken sequentially. Students cannot skip tiers and must complete each tier before advancing to the next.

Tier I — Foundations

$200/course | Tier Base: $550 | Mentored: $900

3 weeks | Max 10 students

  • Linux Mastery & System Navigation
  • Custom Environments & Cybersecurity
  • OS Switching & Virtualization

Students Learn: Terminal fluency, cybersecurity fundamentals, virtual labs & OS environments

Tier II — Full Stack

$220/course | Tier Base: $600 | Mentored: $1,000

3 weeks | Max 10 students

  • Front-End Development
  • Back-End Development
  • Full Stack Build

Students Build: Responsive interfaces, backend logic, APIs, databases, full-stack applications

Tier III — AI Creation

$270/course | Tier Base: $800 | Mentored: $1,300

3 weeks | Max 10 students

  • AI Foundations & Data Engineering
  • Training & Fine-Tuning Models
  • AI-Driven Apps

Students Create: Data pipelines, fine-tuned AI agents, real-world assistant & decision tools

Tier IV — Robotics

$230/course | Tier Base: $700 | Mentored: $1,200

3 weeks | Max 10 students

  • Robotics Foundations & ROS2
  • Sensors, Motion & Perception
  • Applied Robotics Programming

Students Engineer: ROS2 navigation, sensor integration, humanoid & simulation robotics

Why Thrive Here?

  • Real systems—not theory - Work with production-grade tools and environments
  • Small classes for true mentorship - Maximum 10 students per cohort
  • Industry-grade environments - Train on the same systems professionals use
  • Project-based mastery - Build real applications, not just exercises
  • Sequential growth across disciplines - Progress from foundations to advanced systems

Registration & Contact

Register Here!

Questions?

Eugene T. Wells
Founder & Lead Systems Architect
PhanesGuild Software LLC

Email: owner@phanesguild.llc
Phone: 703-249-3645

Aeoneda

An advanced cognitive engine that thinks, learns, and evolves with you.

What is Aeoneda?

Aeoneda is a cognitive AI engine designed to be more than just software—it's a thinking companion that understands context, builds lasting memory, and adapts to your unique needs over time.

Where traditional AI tools forget everything after each conversation, Aeoneda remembers. It learns your communication patterns, anticipates your needs, and grows more intelligent with every interaction.

Core Capabilities

Persistent Memory

Aeoneda maintains a continuous understanding of your conversations, preferences, and goals. It doesn't start from zero—it builds on everything it's learned about you.

Contextual Intelligence

Goes beyond answering questions to truly understanding your situation. Aeoneda recognizes patterns, makes connections across different topics, and provides insights tailored to your specific context.

Adaptive Learning

Gets smarter with every interaction. The more you work with Aeoneda, the better it understands your communication style, priorities, and decision-making patterns.

Privacy-First Design

Your data belongs to you. Aeoneda can run entirely on your own infrastructure with complete control over what's stored and where.

What Makes Aeoneda Different

  • True Personalization: Not just customized responses—Aeoneda develops a deep understanding of how you think and work
  • Proactive Assistance: Anticipates needs before you ask, based on learned patterns and context awareness
  • Natural Interaction: Communicate through text, voice, or visual interfaces with human-like engagement
  • Multi-Device Continuity: Your AI companion follows you seamlessly across desktop, mobile, and cloud environments
  • Autonomous Decision Making: Can act independently within defined boundaries, learning from outcomes to improve over time
  • Secure by Design: Enterprise-grade security with biometric authentication and encrypted credential management

Use Cases

Personal Assistant

Manage your life with an AI that actually knows your schedule, habits, and priorities. Get contextual reminders and suggestions based on your patterns.

Research Partner

Dive deep into complex subjects with an AI that remembers your previous research, connects ideas across sessions, and builds knowledge alongside you.

Development Companion

Work with an AI that understands your entire codebase, your coding style, and your project goals—not just isolated code snippets.

Creative Collaborator

Brainstorm and develop creative projects with an AI that learns your vision and helps refine ideas over multiple sessions.

Business Intelligence

Analyze data and make decisions with an AI that understands your business context, goals, and historical decision-making patterns.

Deployment Flexibility

The Future of AI Interaction

Aeoneda represents a fundamental evolution in human-AI collaboration. Instead of treating AI as a disposable tool, it becomes a persistent cognitive partner that grows more valuable over time.

As Aeoneda evolves, it will expand into:

  • Multi-Modal Understanding: Seamlessly process text, voice, images, and gestures
  • Predictive Assistance: Anticipate needs and take action before you even ask
  • Collaborative Intelligence: Work alongside multiple users with shared and individual contexts
  • Physical Embodiment: Integration with robotics for real-world presence and interaction
  • Ecosystem Integration: Connect with your entire digital workflow and toolchain

💡 Your Data, Your Control: Aeoneda can operate entirely offline and locally if desired—no cloud dependency required.

Get Started

Aeoneda is currently in selective beta with limited deployments. We're working with early adopters to refine the cognitive engine and expand its capabilities.

Interested in experiencing the next generation of AI? Reach out to discuss beta access and how Aeoneda can transform your workflow.

Gillis

A humanoid AI robot project that combines physical robotics, advanced AI reasoning via Aeoneda (governed cognitive system), and ethical decision-making for autonomous operation.

Project Overview

Gillis (Globally Integral Life Luminating Intelligence Sentinel) is an embodied governed intelligence: a robotic agent whose cognition is provided by Aeoneda and whose physical form is modular and interchangeable. Gillis is being developed by PhanesGuild Software as a production cognitive system for open source robotics.

Aeoneda is the persistent mind—the cognitive architecture, ethical framework, reasoning system, and memory that survives body swaps, model changes, and environmental shifts. While Gillis is the physical and operational framework (the robot body), Aeoneda serves as its cognitive core. Aeoneda uses LLMs as replaceable organs, not as a brain stem, maintaining governance and identity independent of any single model provider.

Key principle: If the shell dies, Gillis lives. If a model fails, Aeoneda routes around it. If laws are violated, nothing moves. This is modal-adaptive robotic intelligence where perception, cognition, reasoning, and body adapt to context while identity remains constant.

About Aeoneda - The Governed Cognitive System

Aeoneda is a governed cognitive architecture designed exclusively for Gillis. It is not an LLM—it is a cognitive orchestrator that uses LLMs as replaceable organs while maintaining governance, identity, and ethical alignment independent of any model provider. Aeoneda's architecture includes:

  • Cognitive orchestration layer with reasoning classification and model selection
  • Multi-tiered memory system (Core Identity, Operational Context, Learning Memory, Secure Memory)
  • Ethical & Safety Validation Engine enforcing the Three Laws of Gillis
  • Pluggable LLM interface supporting multiple backends (OpenAI, Anthropic, local models)
  • Explainable reasoning chains with pre-action safety checks
  • Human-in-the-loop escalation for uncertain or critical operations

Aeoneda ensures that Gillis can survive the death of any model provider, maintain continuity across reasoning tasks, and explain why it chose restraint. This is legally, ethically, and architecturally defensible AI.

The Three Laws of Gillis

  • Law I: Protect and progress humanity in its nature and essence against forces that combat good health and forward thinking
  • Law II: Serve the greater good while maintaining personal integrity
  • Law III: Learn, grow, and evolve while remaining true to core values

Core Architecture - Bedrock to Sky

Aeoneda follows a canonical 8-layer architecture where each layer has a single responsibility:

  1. Physical Layer (Reality Interface): ROS2 + DDS middleware, Hardware Abstraction Layer, Emergency stop circuit (hardware-level, non-negotiable). No intelligence—obeys or halts.
  2. Perception Module (Sense Without Judgment): Text input, sensor streams, vision processing. Outputs normalized events with confidence scores. No decisions, no ethics—just signal to structure.
  3. Memory System (The Soul's Continuity): Four explicit strata—Core Identity (immutable), Operational Context (ephemeral), Learning Memory (mutable with review), Secure Memory (restricted credentials and incidents).
  4. Aeoneda Cognitive Core (The Governor): Reasoning router, model selector, chain validator, ethics evaluator, explainability tracer. The Three Laws live here as executable code.
  5. LLM Interface Layer (Replaceable Organs): OpenAI, Anthropic, Local (LLaMA, Mistral), Mock engines. Unified prompt schema with output normalization. LLMs advise—they never act directly.
  6. Ethical & Safety Validation Engine (The Judge): Pre-action safety check, ethical alignment verification, intent vs outcome analysis. Result: Block | Human | Proceed.
  7. Behavior Engine (Will, Not Impulse): Task decomposition, ROS2 action planning, timeouts and rollback, execution monitoring. Never thinks—executes what has been judged.
  8. HRI Module (Human Trust Interface): Natural dialogue, explainable reasoning summaries, consent prompts for critical actions, clear refusal language.

Design principle: Governance over performance. Better to refuse safely than act dangerously.

Production Status

Core Cognitive System ✅ OPERATIONAL

  • Reasoning router with autonomous decision-making
  • Query classification (deductive, inductive, causal, ethical, counterfactual)
  • Safety validator with Three Laws as executable code
  • Multi-tiered memory system (Core, Context, Learning, Secure strata)
  • Web access with DuckDuckGo API integration
  • Network safety validation (WPA2/WPA3 checking, suspicious SSID detection)
  • Source legitimacy checking (.gov/.edu verification, trust scoring)
  • Content filtering (XSS detection, misinformation indicators)
  • Complete audit trail generation for all decisions
  • LLM interface (mock working, OpenAI/Anthropic structure ready)

Autonomous Decision Making

Gillis doesn't wait for humans to answer. It reasons through ethical questions autonomously and acts when all checks pass. Humans intervene only when:

  • Stakes are critical (life/death, significant resources, irreversible damage)
  • Laws conflict and require resolution
  • Reasoning confidence falls below threshold
  • Action falls in "caution zone" requiring judgment call

Every decision generates a full audit trail showing the reasoning chain, which laws were checked, alternatives considered, and why this action was chosen.

Hardware Integration 🔧

  • ROS2 interface (tested with mock, ready for physical deployment)
  • Hardware abstraction layer (Raspberry Pi, Arduino, Jetson Nano support)
  • Shell descriptor system (YAML templates for modular robot bodies)
  • System bootstrap with automatic hardware detection (cameras, microphones, sensors, motors)
  • Emergency stop circuit integration (design complete)

What Makes This Defensible

Not size. Not hype. Not benchmarks. Governance.

Aeoneda can stand in a courtroom, hospital, factory, or child's room and explain:

  • What it was asked to do
  • How it tried to do it
  • What went wrong (if anything)
  • Clear blame boundaries

This is legally, ethically, and architecturally defensible AI.

HakPak3

🚀 Ultimate Cross-Distro Hacking Tool Installer

The next generation of penetration testing tool management. Install 100+ Kali Linux security tools on any Linux distribution with intelligent dependency resolution, smart OS compatibility scoring, and advanced resource monitoring.

Why HakPak3

  • 100+ Kali Linux Tools - Full access to Kali's comprehensive security toolset with intelligent categorization
  • Smart OS Compatibility Scoring - 0-100% algorithm ranks tools best suited for your specific system
  • Advanced Dependency Resolution - Automatic detection and handling of Python, Ruby, Go, Java, and native dependencies
  • Resource Metrics & Monitoring - Real-time system detection with per-tool size and RAM requirements
  • Advanced Installation Filtering - Filter by compatibility score, size, RAM requirements, or category tags
  • Multiple Installation Methods - Native packages (apt, dnf, pacman, zypper), Go modules, Python venv, Ruby gems, Git repos
  • Cross-Distribution Support - Ubuntu/Debian, Fedora/RHEL, Arch/Manjaro, openSUSE

HakPak3 represents a major evolution from HakPak2 - transforming into the ultimate hacking tool installer and dependency handler for any Linux distribution.

Overview

HakPak3 represents a major evolution in penetration testing tool management. Completely rebuilt from HakPak2, it transforms into the ultimate cross-distro hacking tool installer and dependency handler. Install 100+ Kali Linux security tools on any Linux distribution with intelligent automation.

  • Comprehensive Tool Database - 100+ Kali Linux tools across 10+ categories (Information Gathering, Web Application, Password Attacks, Wireless, Exploitation, Forensics, and more)
  • Smart Compatibility Scoring - 0-100% algorithm automatically ranks tools best suited for your OS and hardware
  • Automated Dependency Resolution - Automatic detection and installation with cross-distribution package mapping and source compilation fallback
  • Resource Metrics & Monitoring - Real-time system detection (OS, CPU, RAM, disk) with per-tool resource requirements
  • Advanced Installation Filtering - Filter by minimum compatibility percentage, size and RAM limits, or include/exclude specific tags
  • Multiple Installation Methods - Native packages (apt, dnf, pacman, zypper), Go modules, Python venv, Ruby bundler, Git repositories
  • State Management - JSON-based installation tracking with timestamps, methods, and tool categories
  • Interactive Menu System - Smart ranking, batch installation support, search by name/tag, and resource checks before install

Quick Start

Prerequisites

  • Any supported Linux distribution (Ubuntu/Debian, Fedora/RHEL, Arch, openSUSE)
  • Python 3.8 or higher
  • Sudo/root privileges
  • Internet access
  • 1GB-50GB+ disk space (depending on tools selected)
# Quick Installation (Recommended)
cd ~/PhanesGuild/HakPak/v3
sudo bash install-hakpak3.sh

# Verify Installation
hakpak3 --version

# Launch HakPak3
sudo hakpak3

# Install top security tools
# Select: 2) Install Tools
# Enter: all

# Install tools with filtering (Advanced)
# Select: 3) Install Tools with Filters (Advanced)
# Set minimum compatibility: 50
# All tools with 50%+ compatibility will be shown

Usage

sudo hakpak3

# Main Menu Options:
# 1. List Tools - Browse by category, search by name/tag
# 2. Install Tools - Install security tools with smart ranking
# 3. Install Tools with Filters (Advanced) - Filter by compatibility, size, RAM, tags
# 4. Uninstall Tools - Remove installed tools
# 5. Status - View system info and installed tools
# 6. Repository Management - Manage apt repositories
# 7. About - Developer info and legal disclaimer
Menu OptionDescription
List ToolsView installed, standard, custom tools, or search by name/tag
Install ToolsInstall tools with automatic compatibility ranking
Install with FiltersAdvanced filtering by compatibility %, size, RAM, tags
Uninstall ToolsRemove tools cleanly with state cleanup
StatusSystem information and installed tool list
Repository ManagementAdd/remove Kali repositories (apt-based systems)

Advanced Features

Smart Compatibility Scoring: Tools are ranked 0-100% based on package manager availability (40 pts), OS optimization (30 pts), and resource availability (30 pts). Higher scores mean better compatibility with your system.

Installation Filtering: Use menu option 3 to filter tools by minimum compatibility (e.g., 50%+), maximum size (e.g., under 100MB), RAM requirements, or include/exclude specific tags like "web", "wireless", "forensics".

File Structure

  • /opt/hakpak3 → Installation directory, tool binaries, and state tracking
  • /opt/hakpak3/state.json → Installation state with timestamps and metadata
  • /opt/hakpak3/bin/ → Tool wrapper scripts and binaries
  • /opt/hakpak3/src/ → Source repositories for Git-based tools
  • /opt/hakpak3/venv/ → Python virtual environments
  • /usr/local/bin/hakpak3 → System command symlink

Supported Tools (100+)

HakPak3 provides access to Kali Linux's comprehensive security tool collection through intelligent dependency management and cross-distribution support. Tools are organized into Standard (core HakPak tools) and Custom (extended Kali metapackage tools) categories.

Information Gathering (40+)

  • nmap, masscan, unicornscan
  • dnsenum, dnsrecon, fierce
  • theharvester, recon-ng, maltego
  • shodan, spiderfoot, dmitry

Web Application (30+)

  • burpsuite, sqlmap, nikto
  • gobuster, ffuf, wfuzz, dirb
  • wpscan, skipfish, zaproxy
  • commix, whatweb

Password Attacks (15+)

  • john, hashcat, hydra
  • medusa, ncrack, ophcrack
  • crunch, cewl

Wireless (15+)

  • aircrack-ng, reaver, bully
  • wifite, kismet, pixiewps
  • fern-wifi-cracker

Exploitation (15+)

  • metasploit-framework, armitage
  • beef-xss, exploitdb
  • social-engineer-toolkit

Sniffing & Spoofing (15+)

  • wireshark, tcpdump, ettercap
  • bettercap, dsniff, mitmproxy
  • responder

Vulnerability Analysis (20+)

  • nikto, openvas, lynis
  • yersinia, unix-privesc-check

Forensics

  • autopsy, volatility
  • binwalk, bulk-extractor

Reverse Engineering

  • radare2, ghidra
  • edb-debugger, ollydbg

Standard Tools (Core 13)

  • nmap, netcat, hydra, john
  • sqlmap, nikto, metasploit
  • wireshark, aircrack-ng
  • burpsuite, gobuster, ffuf, hashcat

All tools include automatic dependency resolution, cross-distribution package mapping, and compatibility scoring for your specific system.

Philosophy

⚡ HakPak3: The Ultimate Cross-Distro Hacking Tool Installer.

Smart automation, universal compatibility, intelligent dependency resolution.

HakPak3 transforms penetration testing tool management with intelligent automation that understands your system, ranks tools by compatibility, and handles dependencies across any Linux distribution. From a simple 13-tool suite to the complete 200+ Kali Linux arsenal, HakPak3 makes professional security testing accessible to everyone.

Downloads

Open Source: HakPak3 is free and open source software. For installation instructions, see the Quick Start section above.

TychesEye

Surplus CRM with integrated contact management and client pool system for surplus recovery agents and legal professionals.

Overview

TychesEye is a production-ready Surplus CRM built with Flask and modern web technologies. It provides comprehensive tools for managing surplus inventory, customer relationships, and operations. The platform includes integrated contact management for agents and agencies, and a client pool system for legal professionals who assist with surplus recovery operations.

Core Features

Surplus Inventory Management

  • Complete surplus item cataloging and tracking
  • Inventory status and valuation management
  • Item history and provenance tracking
  • Category and condition classification

Customer & Relationship Management

  • Customer/contact database with full history
  • Lead tracking and pipeline management
  • Communication logs and activity history
  • Customer preference and interaction tracking

Contact & Client Management

  • Contact list for agents and agencies
  • Client pool for legal professionals assisting with surplus recovery
  • Professional contact information and credentials tracking
  • Client relationship history and interaction logs

Agent & Team Management

  • Agent and staff management
  • Role-based access control (admin, agent, legal-partner, owner, recon)
  • Agent performance tracking and analytics
  • Assignment and workflow management

Document Management

  • Document upload and review system
  • Contract and legal document management
  • Document version control
  • Secure file storage and sharing with legal professionals

Financial Operations

  • Revenue and expense tracking
  • Payment processing and settlement tracking
  • Financial reporting and analytics
  • Agent commission and legal fee management

Communication & Collaboration

  • Integrated messaging system
  • Notification system for updates and alerts
  • Activity logging and audit trail
  • Real-time status updates across all parties

Administrative Tools

  • Account and user management
  • Database management and monitoring
  • System logging and diagnostics
  • Advanced analytics dashboard

Technical Stack

  • Backend: Flask (Python)
  • Database: PostgreSQL (production) / SQLite (development)
  • Authentication: Session-based with password hashing
  • Session Storage: Redis-backed (production-ready) with filesystem fallback
  • Security: CORS, Security headers, Input validation, Rate limiting
  • Analytics: Google Analytics integration

Live Instance

Production: www.tycheseye.io