Skip to main content

Defangs and refangs malicious URLs

Project description

Defangs and refangs malicious URLs

Usage

  • As a script: use the defang command to defang or “refang” content, supporting both stdin/stdout streams as well as to/from files on disk:

    $ echo http://evil.example.com/malicious.php | defang
    hXXp://evil.example[.]com/malicious.php
  • As a library:

    >>> from defang import defang
    >>> url = "http://evil.example.com/malicious.php"
    >>> defang(url)
    'hXXp://evil.example[.]com/malicious.php'

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

defang-0.2.4.tar.gz (3.1 kB view details)

Uploaded Source

File details

Details for the file defang-0.2.4.tar.gz.

File metadata

  • Download URL: defang-0.2.4.tar.gz
  • Upload date:
  • Size: 3.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for defang-0.2.4.tar.gz
Algorithm Hash digest
SHA256 c50e3179169cd9ea550b1363af4e2a013fbb78ac90f419a4ec6a65fb384dbec1
MD5 a20603c47e3c421add22c62dd7a6e622
BLAKE2b-256 f4340a27b9443715c2edfe31cd6989b5a2317039536d600c1e526652c9eb7b19

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page