
RiskIntel is a multithreaded recon tool automating domain intelligence for red team and security ops.
RiskIntel is a Python-based external reconnaissance tool built for red teamers, security researchers, and penetration testers. It automates domain intelligence gathering with modules for WHOIS, subdomains, DNS records, HTTP headers, SSL details, and more. Multithreaded for speed, it rapidly reveals critical web infrastructure data to support early-stage recon and security analysis workflows.
-
⚡️ Rapid Recon Workflow: Executes all essential recon phases in a smooth, automated flow.
-
🧠 Intelligent Automation: Minimal manual input — just plug in a domain and let it do the heavy lifting.
-
🛠️ Modular Design: Each function operates independently for easy debugging, upgrades, or customization.
-
🎨 Aesthetic Terminal Output: Uses rich for clean, colorful, and readable console logs.
-
🌍 Cross-Platform Support: Runs like a breeze on both UNIX-based and Windows environments.
-
📦 Recon Modules Included: Whois Lookup, Subdomain Enumeration, DNS Records, IP Info Extraction, SSL Version Detection, Typosquatting, and more.
-
🔒 Output Persistence: Neatly stores all recon results into a structured folder system for later use.
- Pre-requisites: Ensure you have Python3 installed on your system.
- Clone the Repo: Use "git clone https://github.com/Cursed271/RiskIntel"
- Traverse into the Directory: Use "cd RiskIntel"
- Install Dependencies: Use "pip3 install -r requirements.txt"
- Execute the Script: Use "python3 RiskIntel.py"
- Enter the Domain Name (When Prompted)
Have suggestions or feature requests? Feel free to reach out via:
- 🐦 Twitter: @Cursed271
- 🐙 GitHub: @Cursed271
- 🔗 LinkedIn: Steven Pereira
- 📧 Email: [email protected]
- 🐞 File an Issue: GitHub Issues
- 💡 Request a Feature: Feature Requests
Your feedback helps improve RiskIntel! Contributions and PRs are always welcome. 🚀
- Steven Pereira (aka Cursed) - Creator & Maintainer
RiskIntel is licensed under the MIT License. See the LICENSE file for details.