Skip to main content

Defangs and refangs malicious URLs

Project description

Defangs and refangs malicious URLs

Usage

  • As a script: use the defang command to defang or “refang” content, supporting both stdin/stdout streams as well as to/from files on disk:

    $ echo http://evil.example.com/malicious.php | defang
    hXXp://evil.example[.]com/malicious.php
  • As a library:

    >>> from defang import defang
    >>> url = "http://evil.example.com/malicious.php"
    >>> defang(url)
    'hXXp://evil.example[.]com/malicious.php'

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

defang-0.2.5.tar.gz (3.1 kB view details)

Uploaded Source

File details

Details for the file defang-0.2.5.tar.gz.

File metadata

  • Download URL: defang-0.2.5.tar.gz
  • Upload date:
  • Size: 3.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for defang-0.2.5.tar.gz
Algorithm Hash digest
SHA256 92b242991150fa708d0f1c87111861e3ae700b8fc2de34a21c136c406bf0b355
MD5 69854714cb9f7560d0b01bbcc16c5885
BLAKE2b-256 44a0ae5d1814e70ae9771bf2c4e01073e26afd2dd550d89f3a2f45c441575c7b

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page