## Start a simple scan with default 'general' flow
osmedeusscan-tsample.com
## Start a general scan but exclude some of the module
osmedeusscan-tsample.com-xscreenshot-xspider
## Start a scan directly with a module with inputs as a list of http domains like this https://sub.example.com
osmedeusscan-mcontent-discovery-thttp-file.txt
## Initiate the scan using a speed option other than the default setting
osmedeusscan-fvuln--tacticgently-tsample.com
osmedeusscan--threads-hold=10-tsample.com
## Start a simple scan with other flow
osmedeusscan-fvuln-tsample.com
osmedeusscan-fextensive-tsample.com-tanother.com
osmedeusscan-furls-tlist-of-urls.txt
## Scan list of targets
osmedeusscan-Tlist_of_targets.txt
osmedeusscan-fvuln-Tlist-of-targets.txt
## Performing static vulnerability scan and secret scan on a git repo
osmedeusscan-mrepo-scan-thttps://github.com/j3ssie/sample-repo
osmedeusscan-mrepo-scan-Tlist-of-repo.txt
## Scan for CIDR with file contains CIDR with the format '1.2.3.4/24'
osmedeusscan-fcidr-tlist-of-ciders.txt
osmedeusscan-fcidr-t'1.2.3.4/24'# this will auto convert the single input to the file and run## Directly run on vuln scan and directory scan on list of domains
osmedeusscan-fdomains-tlist-of-domains.txt
osmedeusscan-fvuln-and-dirb-tlist-of-domains.txt
## Use a custom wordlist
osmedeusscan-tsample.com-p'wordlists={{Data}}/wordlists/content/big.txt'## Use a custom wordlist
catlist_of_targets.txt|osmedeusscan-c2## Start a normal scan and backup entire workflow folder to the backup folder
osmedeusscan--backup-fdomains-tlist-of-subdomains.txt
## Start the scan with chunk inputs to review the output way more much faster
osmedeusscan--chunk--chunk-parts20-fcidr-tlist-of-100-cidr.txt
## Continuously run the scan on a target right after it finished
osmedeusutilscron--for--cmd'osmedeus scan -t example.com'
💡Forfullhelpmessage,pleaserun:osmedeusscan--hh