Skip to main content

Defangs and refangs malicious URLs

Project description

Defangs and refangs malicious URLs

Usage

  • As a script: use the defang command to defang or “refang” content, supporting both stdin/stdout streams as well as to/from files on disk:

    $ echo http://evil.example.com/malicious.php | defang
    hXXp://evil.example[.]com/malicious.php
  • As a library:

    >>> from defang import defang
    >>> url = "http://evil.example.com/malicious.php"
    >>> defang(url)
    'hXXp://evil.example[.]com/malicious.php'

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

defang-0.2.3.tar.gz (3.1 kB view details)

Uploaded Source

File details

Details for the file defang-0.2.3.tar.gz.

File metadata

  • Download URL: defang-0.2.3.tar.gz
  • Upload date:
  • Size: 3.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for defang-0.2.3.tar.gz
Algorithm Hash digest
SHA256 c04643290ab3b5d571433f08d8c60d395496054b52f6cdc7695fcc09432af03e
MD5 76c1d78c1d3ffd7decf6ea416cb1812c
BLAKE2b-256 bc85de87123f72e48ad1e1b9a8ce26a8b41ff8cd3a60e6a859e8d50d9683bcf2

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page