Skip to main content
This is a pre-production deployment of Warehouse. Changes made here affect the production instance of PyPI (pypi.python.org).
Help us improve Python packaging - Donate today!

Defangs and refangs malicious URLs

Project Description

Defangs and refangs malicious URLs

Usage

  • As a script: use the defang command to defang or “refang” content, supporting both stdin/stdout streams as well as to/from files on disk:

    $ echo http://evil.example.com/malicious.php | defang
    hXXp://evil.example[.]com/malicious.php
    
  • As a library:

    >>> from defang import defang
    >>> url = "http://evil.example.com/malicious.php"
    >>> defang(url)
    'hXXp://evil.example[.]com/malicious.php'
    

Release History

This version
History Node

0.2.3

History Node

0.2.2

History Node

0.2.1

History Node

0.2.0

History Node

0.1.3

History Node

0.1.2

History Node

0.1.0

Download Files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Filename, Size & Hash SHA256 Hash Help File Type Python Version Upload Date
defang-0.2.3.tar.gz
(3.1 kB) Copy SHA256 Hash SHA256
Source None Jan 24, 2018

Supported By

Elastic Elastic Search Pingdom Pingdom Monitoring Dyn Dyn DNS Sentry Sentry Error Logging CloudAMQP CloudAMQP RabbitMQ Heroku Heroku PaaS Kabu Creative Kabu Creative UX & Design Fastly Fastly CDN DigiCert DigiCert EV Certificate Google Google Cloud Servers DreamHost DreamHost Log Hosting