Defangs and refangs malicious URLs
Project description
Defangs and refangs malicious URLs
Usage
As a script: use the defang command to defang or “refang” content, supporting both stdin/stdout streams as well as to/from files on disk:
$ echo http://evil.example.com/malicious.php | defang hXXp://evil.example[.]com/malicious.php
As a library:
>>> from defang import defang >>> url = "http://evil.example.com/malicious.php" >>> defang(url) 'hXXp://evil.example[.]com/malicious.php'
Releases
- 0.3.0:
added some regex fixes and arbitrary protocol defanging
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
defang-0.3.0.tar.gz
(3.3 kB
view details)
File details
Details for the file defang-0.3.0.tar.gz
.
File metadata
- Download URL: defang-0.3.0.tar.gz
- Upload date:
- Size: 3.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 |
2c5810cb46ae6f76b9e35f68d5a71a1e502dc6d3b7a3f661986eaef01bd12309
|
|
MD5 |
7f024831622d729a7e157bbab9a86587
|
|
BLAKE2b-256 |
ed814e4c8b9ef4ffe6ad1a89bd6dec516e5255e2598884fb32a57be9fa6e7027
|