Skip to main content

Defangs and refangs malicious URLs

Project description

Defangs and refangs malicious URLs

Usage

  • As a script: use the defang command to defang or “refang” content, supporting both stdin/stdout streams as well as to/from files on disk:

    $ echo http://evil.example.com/malicious.php | defang
    hXXp://evil.example[.]com/malicious.php
  • As a library:

    >>> from defang import defang
    >>> url = "http://evil.example.com/malicious.php"
    >>> defang(url)
    'hXXp://evil.example[.]com/malicious.php'

Releases

0.3.0:
  • added some regex fixes and arbitrary protocol defanging

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

defang-0.3.0.tar.gz (3.3 kB view details)

Uploaded Source

File details

Details for the file defang-0.3.0.tar.gz.

File metadata

  • Download URL: defang-0.3.0.tar.gz
  • Upload date:
  • Size: 3.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for defang-0.3.0.tar.gz
Algorithm Hash digest
SHA256 2c5810cb46ae6f76b9e35f68d5a71a1e502dc6d3b7a3f661986eaef01bd12309
MD5 7f024831622d729a7e157bbab9a86587
BLAKE2b-256 ed814e4c8b9ef4ffe6ad1a89bd6dec516e5255e2598884fb32a57be9fa6e7027

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page