Skip to main content

Defangs and refangs malicious URLs

Project description

Defangs and refangs malicious URLs

Usage

  • As a script: use the defang command to defang or “refang” content, supporting both stdin/stdout streams as well as to/from files on disk:

    $ echo http://evil.example.com/malicious.php | defang
    hXXp://evil.example[.]com/malicious.php
  • As a library:

    >>> from defang import defang
    >>> url = "http://evil.example.com/malicious.php"
    >>> defang(url)
    'hXXp://evil.example[.]com/malicious.php'

Releases

0.4.0:
  • added support for URIs with IPv4

0.3.0:
  • added some regex fixes and arbitrary protocol defanging

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

defang-0.4.0.tar.gz (3.4 kB view details)

Uploaded Source

File details

Details for the file defang-0.4.0.tar.gz.

File metadata

  • Download URL: defang-0.4.0.tar.gz
  • Upload date:
  • Size: 3.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for defang-0.4.0.tar.gz
Algorithm Hash digest
SHA256 94e9175a819b18f6f3eb7a434efdd76c4e49992537c8ad2962ed0ff1fac49bed
MD5 97e4f47e2d2342abef271de4bb39ba84
BLAKE2b-256 b77c3c1effde7cc7c50d1abeabb901f5b2fea0761070ead79b99037d96c08053

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page