ENNAENNA

pagodo vs Recon-ng

GitHub Stats

3.3k
Stars
5.5k
547
Forks
857
3
Issues
37
4mo ago
Updated
1y ago
GPL-3.0
License
GPL-3.0
Python
Language
Python

About pagodo

pagodo (Passive Google Dork) is a Python tool that automates Google Hacking Database (GHDB) dorking by systematically querying Google with hundreds of known search operators designed to uncover sensitive information exposed on the internet. It scrapes the Google Hacking Database for current dork entries and executes them against a specified target domain, identifying exposed files, login portals, configuration data, and other information leakage. OSINT analysts, penetration testers, and bug bounty hunters use pagodo during passive reconnaissance to discover what sensitive resources a target has inadvertently exposed to search engine indexing. The tool implements rate limiting and proxy support to avoid Google's anti-automation measures, making it practical for large-scale dorking campaigns that would be tedious to perform manually.

About Recon-ng

Recon-ng is a web reconnaissance framework with a modular design and a Metasploit-like interface. It facilitates the gathering of open-source intelligence (OSINT) by incorporating a wide range of modules that perform tasks like data collection, analysis, and reporting. Recon-ng supports API key management, integrates with various third-party services, and provides a powerful scripting environment for customizing reconnaissance workflows, making it a staple in the toolkit of security professionals.

Platform Support

๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows
๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows

Tags

pagodo only

google-dorkghdbosintpassive

Recon-ng only

frameworkmodularapi-keysreporting