pagodo
GPL-3.0๐ General OSINT ยท Python
pagodo (Passive Google Dork) is a Python tool that automates Google Hacking Database (GHDB) dorking by systematically querying Google with hundreds of known search operators designed to uncover sensitive information exposed on the internet. It scrapes the Google Hacking Database for current dork entries and executes them against a specified target domain, identifying exposed files, login portals, configuration data, and other information leakage. OSINT analysts, penetration testers, and bug bounty hunters use pagodo during passive reconnaissance to discover what sensitive resources a target has inadvertently exposed to search engine indexing. The tool implements rate limiting and proxy support to avoid Google's anti-automation measures, making it practical for large-scale dorking campaigns that would be tedious to perform manually.
Tags
Details
- Category
- ๐ General OSINT
- Language
- Python
- Repository
- opsdisk/pagodo
- License
- GPL-3.0
- Platforms
- ๐งlinux๐macos๐ชwindows
Links
Community Reviews
No reviews yet. Be the first to review pagodo.
More in General OSINT
theHarvester
PythonGathers emails, names, subdomains, IPs, and URLs from multiple public sources for passive recon.
SpiderFoot
PythonAutomated OSINT with 200+ modules. Web UI for scanning IPs, domains, emails, names, and more.
Maltego CE
JavaVisual link analysis tool for OSINT. Maps relationships between people, companies, domains, and infrastructure.
Holehe
PythonCheck if an email is registered on 120+ sites. Uses password recovery mechanisms to verify without logging in.
ExifTool
PerlRead, write, and edit metadata in files. Supports EXIF, GPS, IPTC, XMP, and more across dozens of formats.
PhoneInfoga
GoAdvanced phone number OSINT. Scans phone numbers using free resources to gather standard and disposable info.