Skip to content
@AkashaCorporation

AkashaCorporation


HikariSystem Field Arch


"To master the machine, one must first read its records."



What We Build

Akasha Corporation develops low-level security tooling for binary analysis, CPU emulation, reverse engineering, and offensive security. Our work lives at the boundary between software and hardware — where most tools stop, ours begins.

All projects operate under the HikariSystem philosophy: lean, composable, built for professionals.


Flagship — HexCore IDE v3.7.4

HikariSystem-HexCore is a full reverse engineering IDE purpose-built for malware analysis. Not a plugin. Not a wrapper around another tool. A complete analysis environment built from scratch on Code-OSS.

Static Analysis → CPU Emulation → IR Lifting → Decompilation → Automation Pipeline

Layer Technology Status
Disassembly Capstone v5 (N-API) Production
CPU Emulation Unicorn Engine 2.1.4 (N-API) — 70+ API hooks Production
Assembly & Patching LLVM 18 MC (N-API) Production
IR Lifting Remill → LLVM IR (N-API) — format-aware (PE64/ELF modes) Production
Decompilation Helix MLIR — C++23 pipeline, C AST layer, 18 passes (N-API) v0.8.0
Session Persistence SQLite-backed .hexcore_session.db — renames, retypes, bookmarks Production
Superoptimization Souper (Z3 SMT) Planned (v3.8)
Automation Pipeline .hexcore_job.json — headless batch analysis Production

Latest: v3.7.4 "Remill Refinement + mali_kbase Siege" — Format-aware lifting (PE64/ELF modes with LiftMode, additionalLeaders, gap scan), Helix 0.8.0 C AST decompiler with 14-pass tree optimizer, ELF ET_REL external symbol resolution, SysV/Win64 ABI auto-detection, session database persistence, deep PE/ELF analysis with 180+ API signatures, Base64 confidence scoring engine.


HikariSystem Arsenal

Project Description Version
HexCore Full reverse engineering IDE — disassembly, emulation, decompilation v3.7.4
Scylla Studio Pentesting IDE — recon, HTTP testing, headless automation Active
Tsurugi Offensive security tooling Active
Ananke Threat intelligence & automation Active

Native Engine Suite

High-performance N-API bindings. No external installs. No wrappers. Built in-house.

Engine Role Version
hexcore-capstone Multi-arch disassembly (x86, ARM, RISC-V) 1.3.4
hexcore-unicorn CPU emulation with hook system (Unicorn 2.1.4) 1.2.3
hexcore-llvm-mc Binary assembly & patching (LLVM 18) 1.0.1
hexcore-remill Machine code → LLVM IR lifting (format-aware) 0.2.0
hexcore-helix LLVM IR → C via C++23/MLIR (18 passes, C AST layer) 0.8.0
hexcore-better-sqlite3 SQLite for session persistence & IOC storage 2.0.0

Roadmap


v3.7.4 ████████████████████ Released — Format-Aware Lifting + Helix C AST
v3.8 ████████████░░░░░░░░ In Progress — Souper Superoptimizer + Rellic Removal

v3.9 ████░░░░░░░░░░░░░░░░ Planned — BinDiff Integration + Job Queue Manager
v4.0 ██░░░░░░░░░░░░░░░░░░ Research — Oracle Hook (Live AI Callbacks)


Core Team

Handle Role
🐻 LXrdKnowkill Founder · Architecture · Everything
🐺 MayaRomanova C++23 · MLIR · Helix Engine
🦂 ThreatBiih Threat Intel · Unicorn Engine · Frontend
🦆 YasminePayload Pipeline · Automation · Features

Community

HikariSystem is an open community working across security research, reverse engineering, malware analysis, and offensive tooling. If you're building something serious — you belong here.

Browse all repositories →


HikariSystem — Security Tools for Professionals Copyright © 2026 Akasha Corporation. All rights reserved.

Pinned Loading

  1. HikariSystem-HexCore HikariSystem-HexCore Public

    The Native Reverse Engineering IDE. Zero-overhead binary analysis, full CPU emulation (PE/ELF), and headless automation. Powered by Capstone, Unicorn, LLVM & Remill via N-API.

    TypeScript 8 1

  2. hexcore-capstone hexcore-capstone Public

    C++ 3

  3. hexcore-llvm-mc hexcore-llvm-mc Public

    C++ 2

  4. hexcore-remill hexcore-remill Public

    C++ 1

  5. hexcore-unicorn hexcore-unicorn Public

    C++ 2

Repositories

Showing 10 of 13 repositories

Top languages

Loading…

Most used topics

Loading…