Defangs and refangs malicious URLs
Project description
Defangs and refangs malicious URLs
Usage
As a script: use the defang command to defang or “refang” content, supporting both stdin/stdout streams as well as to/from files on disk:
$ echo http://evil.example.com/malicious.php | defang hXXp://evil.example[.]com/malicious.php
As a library:
>>> from defang import defang >>> url = "http://evil.example.com/malicious.php" >>> defang(url) 'hXXp://evil.example[.]com/malicious.php'
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
defang-0.2.3.tar.gz
(3.1 kB
view details)
File details
Details for the file defang-0.2.3.tar.gz.
File metadata
- Download URL: defang-0.2.3.tar.gz
- Upload date:
- Size: 3.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
c04643290ab3b5d571433f08d8c60d395496054b52f6cdc7695fcc09432af03e
|
|
| MD5 |
76c1d78c1d3ffd7decf6ea416cb1812c
|
|
| BLAKE2b-256 |
bc85de87123f72e48ad1e1b9a8ce26a8b41ff8cd3a60e6a859e8d50d9683bcf2
|