Skip to main content

Defangs and refangs malicious URLs

Project description

Defangs and refangs malicious URLs

Usage

  • As a script: use the defang command to defang or “refang” content, supporting both stdin/stdout streams as well as to/from files on disk:

    $ echo http://evil.example.com/malicious.php | defang
    hXXp://evil.example[.]com/malicious.php
  • As a library:

    >>> from defang import defang
    >>> url = "http://evil.example.com/malicious.php"
    >>> defang(url)
    'hXXp://evil.example[.]com/malicious.php'

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

defang-0.2.1.tar.gz (3.1 kB view details)

Uploaded Source

File details

Details for the file defang-0.2.1.tar.gz.

File metadata

  • Download URL: defang-0.2.1.tar.gz
  • Upload date:
  • Size: 3.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for defang-0.2.1.tar.gz
Algorithm Hash digest
SHA256 12020508dd39878abd85ce490d7f440f9b8e9a5efb4947f35b825e86b634cddb
MD5 e1c56a8ce881a56316cc943501aa3843
BLAKE2b-256 b43e9646198de759402e03373837a2782919acd28438038d0d47cba688deefa2

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page