Defangs and refangs malicious URLs
Project description
Defangs and refangs malicious URLs
Usage
As a script: use the defang command to defang or “refang” content, supporting both stdin/stdout streams as well as to/from files on disk:
$ echo http://evil.example.com/malicious.php | defang hXXp://evil.example[.]com/malicious.php
As a library:
>>> from defang import defang >>> url = "http://evil.example.com/malicious.php" >>> defang(url) 'hXXp://evil.example[.]com/malicious.php'
We’ve added a few new keyword argument options:
>>> defang(url, colon=True) 'hXXp[:]//evil.example[.]com/malicious.php' >>> defang(url, all_dots=True) 'hXXp://evil[.]example[.]com/malicious.php'
Releases
- 0.5.0:
added new options to defang
all_dots=True will turn all dots into [.] and not just the one before the TLD
colon=True will translate http:// into http[:]// as well as other protocols
- 0.4.0:
added support for URIs with IPv4
- 0.3.0:
added some regex fixes and arbitrary protocol defanging
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
defang-0.5.0.tar.gz
(4.3 kB
view details)
File details
Details for the file defang-0.5.0.tar.gz.
File metadata
- Download URL: defang-0.5.0.tar.gz
- Upload date:
- Size: 4.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.11.0 pkginfo/1.4.2 requests/2.19.1 setuptools/41.0.1 requests-toolbelt/0.8.0 tqdm/4.23.4 CPython/3.5.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
84084af3a758c52ac5a7133637fde68460d1f354008e4d698d862402ec0368b3
|
|
| MD5 |
5c950e9c06ea18048bd9c92e2eec3e31
|
|
| BLAKE2b-256 |
dc52bee9afb097ce52c0bdbf2d1aebafdef471bc40f2bf3c3e23db49d948f9ee
|