yafra
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Science Score: 52.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
✓CITATION.cff file
Found CITATION.cff file -
✓codemeta.json file
Found codemeta.json file -
✓.zenodo.json file
Found .zenodo.json file -
○DOI references
-
○Academic publication links
-
○Academic email domains
-
✓Institutional organization owner
Organization hm-seclab has institutional domain (seclab.cs.hm.edu) -
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (7.5%) to scientific vocabulary
Keywords
Repository
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Basic Info
- Host: GitHub
- Owner: hm-seclab
- License: apache-2.0
- Language: Python
- Default Branch: master
- Homepage: https://seclab.cs.hm.edu/oss-projects/yafra/
- Size: 1.26 MB
Statistics
- Stars: 27
- Watchers: 3
- Forks: 5
- Open Issues: 37
- Releases: 0
Topics
Metadata Files
README.md
YAFRA
YAFRA stands for [y]et [a]nother [f]ramework for [r]eport [a]nalysis
Description
YAFRA is a semi-automated framework for analysing and representing reports about IT security incidents. Users can provide reports as PDF and YAFRA will extract IOCs (indicators of compromise). After extraction these IOCs will be enriched by external sources such as VirusTotal or MITRE in order to provide more context.
Installation and Configuration
For information about the installation and configuration have a look in the docs folder.
Examples
Example reports can be found on the website of the US-CERT (CISA): https://us-cert.cisa.gov/ncas/analysis-reports
Extensions
YAFRA provides a simple to use extension system called YAFRA-Extensions. For more information, have a look at the extensions folder.
Owner
- Name: SecLab Munich
- Login: hm-seclab
- Kind: organization
- Location: Munich, Germany
- Website: https://seclab.cs.hm.edu
- Repositories: 4
- Profile: https://github.com/hm-seclab
IT Security Lab of the Munich University of Applied Sciences
Citation (CITATION.cff)
cff-version: 1.2.0 message: "Please cite this software if you use it in your work." authors: - family-names: "Westphal" given-names: "Alexander Michael" orcid: "https://orcid.org/0000-0002-6897-857X" - family-names: "Schreck" given-names: "Thomas" orcid: "https://orcid.org/0000-0002-8960-6986" title: "YAFRA" version: 0.1.1 date-released: 2021-08-16 url: "https://github.com/hm-seclab/YAFRA"
GitHub Events
Total
- Fork event: 1
Last Year
- Fork event: 1
Dependencies
- APScheduler ==3.7.0
- Deprecated ==1.2.12
- Flask ==1.1.2
- Flask-APScheduler ==1.12.1
- Flask-Dropzone ==1.6.0
- Flask-Script ==2.0.6
- Jinja2 ==2.11.3
- MarkupSafe ==1.1.1
- Pillow ==8.3.2
- PyPDF2 ==1.26.0
- PySocks ==1.7.1
- PyYAML ==5.4.1
- Werkzeug ==1.0.1
- astroid ==2.6.2
- attrs ==20.3.0
- beautifulsoup4 ==4.9.3
- breadability ==0.1.20
- bs4 ==0.0.1
- certifi ==2020.12.5
- chardet ==4.0.0
- click ==7.1.2
- colorama ==0.4.4
- docopt ==0.6.2
- fire ==0.3.1
- idna ==2.10
- ioc-fanger ==3.2.3
- ioc-finder ==5.0.2
- iocextract ==1.13.1
- isort ==5.9.2
- itsdangerous ==1.1.0
- joblib ==1.0.1
- jsonschema ==3.2.0
- kafka-python ==2.0.2
- langdetect ==1.0.9
- lazy-object-proxy ==1.6.0
- lxml ==4.6.5
- markdown-tree-parser ==0.1
- mccabe ==0.6.1
- mdutils ==1.3.0
- nltk ==3.6.4
- numpy ==1.21.2
- oauthlib ==3.1.1
- pdfminer ==20191125
- pendulum ==1.2.5
- pyattck ==3.0.1
- pycountry ==20.7.3
- pycryptodome ==3.10.1
- pyfiglet ==0.8.post1
- pylint ==2.9.3
- pylint-flask ==0.6
- pylint-plugin-utils ==0.6
- pymisp ==2.4.141.1
- pyparsing ==2.4.7
- pyrsistent ==0.17.3
- python-dateutil ==2.8.1
- python-gitlab ==2.6.0
- pytz ==2021.1
- pytzdata ==2020.1
- regex ==2021.4.4
- requests ==2.25.1
- requests-oauthlib ==1.3.0
- requests-toolbelt ==0.9.1
- six ==1.15.0
- soupsieve ==2.2.1
- sumy ==0.8.1
- termcolor ==1.1.0
- toml ==0.10.2
- tqdm ==4.62.1
- tweepy ==3.10.0
- tzlocal ==2.1
- urllib3 ==1.26.6
- wrapt ==1.12.1
