Freki is a free and open-source malware analysis platform.
- Facilitate malware analysis and reverse engineering;
- Provide an easy-to-use REST API for different projects;
- Easy deployment (via Docker);
- Allow the addition of new features by the community.
- Hash extraction.
- VirusTotal API queries.
- Static analysis of PE files (headers, sections, imports, capabilities, and strings).
- Pattern matching with Yara.
- Web interface and REST API.
- User management.
- Community comments.
- Download samples.
Check our wiki for more details.
Open an issue to suggest new features. All contributions are welcome.
git clone https://github.com/crhenr/freki.git
Video demo: https://youtu.be/AW4afoaogt0.
- Install Docker and Docker Compose.
- Edit the .env file.
- If you are going to use it in production, edit freki.conf to enable HTTPS.
- Run
docker-compose up
ormake
.
If you want to use it locally (e.g., for development), please check our wiki for more details.
Thanks to Flaticon for the SVG logo.
This project is licensed under the GNU Affero General Public License.