Skip to content

Commit 891f405

Browse files
committed
add -asq doc
1 parent b4f5c81 commit 891f405

File tree

2 files changed

+13
-0
lines changed

2 files changed

+13
-0
lines changed

tools/uncover/running.mdx

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -183,6 +183,18 @@ echo 51.83.59.99/24 | uncover
183183
51.83.59.3:993
184184
```
185185

186+
187+
### [Awesome Search Queries Integration](https://github.com/projectdiscovery/awesome-search-queries)
188+
189+
The `-asq, -awesome-search-queries` flag allows you to use predefined awesome search queries to discover exposed assets on the internet. This feature leverages a curated list of queries that are known to yield interesting results. To use this feature, simply specify the `-asq` flag followed by the desired query. For example, to search for exposed Jira instances, you can use:
190+
191+
```console
192+
uncover -asq jira -silent
193+
194+
....
195+
```
196+
197+
186198
### Field Format
187199

188200
`-f, -field` flag can be used to indicate which fields to return, currently, `ip`, `port`, and `host` are supported and can be used to return desired fields.

tools/uncover/usage.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ Flags:
1818
INPUT:
1919
-q, -query string[] search query, supports: stdin,file,config input (example: -q 'example query', -q 'query.txt')
2020
-e, -engine string[] search engine to query (shodan,shodan-idb,fofa,censys,quake,hunter,zoomeye,netlas,criminalip,publicwww,hunterhow) (default shodan)
21+
-asq, -awesome-search-queries string[] use awesome search queries to discover exposed assets on the internet (example: -asq 'jira')
2122

2223
SEARCH-ENGINE:
2324
-s, -shodan string[] search query for shodan (example: -shodan 'query.txt')

0 commit comments

Comments
 (0)