Freki is an open-source malware analysis platform that facilitates automated malware inspection through a user-friendly web interface and REST API.
:wolf: Malware analysis platform
Freki is designed for malware analysts, reverse engineers, and threat hunters to streamline the analysis and investigation of malware samples. It provides tools for static analysis, hash extraction, and integration with VirusTotal, enabling efficient malware forensics and threat intelligence gathering.
Freki requires Docker and Docker Compose for the easiest deployment; HTTPS configuration is recommended for production environments. The platform provides a REST API allowing integration with other tools and automation workflows. Users should refer to the online documentation for advanced setup and development details.
Install Docker from https://docs.docker.com/get-docker/
Install Docker Compose from https://docs.docker.com/compose/install/
Clone the repository: git clone https://github.com/cristianzsh/freki.git
Edit the .env file to configure environment variables
For production use, edit nginx/freki.conf to enable HTTPS
Run the platform using docker-compose up or make
git clone https://github.com/cristianzsh/freki.git
Clones the Freki source code repository locally
docker-compose up
Starts the Freki platform using Docker Compose
make
Alternative command to launch Freki via Docker