Defangs and refangs malicious IOCs
Download the latest release from https://github.com/jakewarren/defang/releases/latest
go get github.com/jakewarren/defang/...
defang accepts input from STDIN, a string argument, or a file argument
❯ echo -e "malware.evil.com\napp.malicious.com" | defang
malware.evil[.]com
app.malicious[.]com
❯ defang "malware.evil.com"
malware.evil[.]com
❯ defang /tmp/urls.txt
app.malicious[.]com
❯ defang --refang "hXXp://evil.example[.]com/malicious.php"
http://evil.example.com/malicious.php
import (
	"fmt"
	"github.com/jakewarren/defang"
)
func main() {
	u, _ := defang.URL("https://malware.evil.com")
	fmt.Println(u)
	// Output: hxxps://malware.evil[.]com
	u, _ = defang.URLWithMask("https://malware.evil.com", defang.Meow)
	fmt.Println(u)
	// Output: meows://malware.evil[.]com
	defangedIP, _ := defang.IPv4("8.8.8.8")
	fmt.Println(defangedIP)
	// Output: 8.8.8[.]8
}
All notable changes to this project will be documented in the changelog.
The format is based on Keep a Changelog and this project adheres to Semantic Versioning.
MIT © 2018 Jake Warren