pagodo vs Recon-ng
GitHub Stats
About pagodo
pagodo (Passive Google Dork) is a Python tool that automates Google Hacking Database (GHDB) dorking by systematically querying Google with hundreds of known search operators designed to uncover sensitive information exposed on the internet. It scrapes the Google Hacking Database for current dork entries and executes them against a specified target domain, identifying exposed files, login portals, configuration data, and other information leakage. OSINT analysts, penetration testers, and bug bounty hunters use pagodo during passive reconnaissance to discover what sensitive resources a target has inadvertently exposed to search engine indexing. The tool implements rate limiting and proxy support to avoid Google's anti-automation measures, making it practical for large-scale dorking campaigns that would be tedious to perform manually.
About Recon-ng
Recon-ng is a web reconnaissance framework with a modular design and a Metasploit-like interface. It facilitates the gathering of open-source intelligence (OSINT) by incorporating a wide range of modules that perform tasks like data collection, analysis, and reporting. Recon-ng supports API key management, integrates with various third-party services, and provides a powerful scripting environment for customizing reconnaissance workflows, making it a staple in the toolkit of security professionals.
Platform Support
Tags
pagodo only
Recon-ng only