Akasha Corporation develops low-level security tooling for binary analysis, CPU emulation, reverse engineering, and offensive security. Our work lives at the boundary between software and hardware — where most tools stop, ours begins.
All projects operate under the HikariSystem philosophy: lean, composable, built for professionals.
HikariSystem-HexCore is a full reverse engineering IDE purpose-built for malware analysis. Not a plugin. Not a wrapper around another tool. A complete analysis environment built from scratch on Code-OSS.
Static Analysis → CPU Emulation → IR Lifting → Decompilation → Automation Pipeline
| Layer | Technology | Status |
|---|---|---|
| Disassembly | Capstone v5 (N-API) | Production |
| CPU Emulation | Unicorn Engine 2.1.4 (N-API) — 70+ API hooks | Production |
| Assembly & Patching | LLVM 18 MC (N-API) | Production |
| IR Lifting | Remill → LLVM IR (N-API) — format-aware (PE64/ELF modes) | Production |
| Decompilation | Helix MLIR — C++23 pipeline, C AST layer, 18 passes (N-API) | v0.8.0 |
| Session Persistence | SQLite-backed .hexcore_session.db — renames, retypes, bookmarks |
Production |
| Superoptimization | Souper (Z3 SMT) | Planned (v3.8) |
| Automation Pipeline | .hexcore_job.json — headless batch analysis |
Production |
Latest: v3.7.4 "Remill Refinement + mali_kbase Siege" — Format-aware lifting (PE64/ELF modes with LiftMode, additionalLeaders, gap scan), Helix 0.8.0 C AST decompiler with 14-pass tree optimizer, ELF ET_REL external symbol resolution, SysV/Win64 ABI auto-detection, session database persistence, deep PE/ELF analysis with 180+ API signatures, Base64 confidence scoring engine.
| Project | Description | Version |
|---|---|---|
| HexCore | Full reverse engineering IDE — disassembly, emulation, decompilation | v3.7.4 |
| Scylla Studio | Pentesting IDE — recon, HTTP testing, headless automation | Active |
| Tsurugi | Offensive security tooling | Active |
| Ananke | Threat intelligence & automation | Active |
High-performance N-API bindings. No external installs. No wrappers. Built in-house.
| Engine | Role | Version |
|---|---|---|
| hexcore-capstone | Multi-arch disassembly (x86, ARM, RISC-V) | 1.3.4 |
| hexcore-unicorn | CPU emulation with hook system (Unicorn 2.1.4) | 1.2.3 |
| hexcore-llvm-mc | Binary assembly & patching (LLVM 18) | 1.0.1 |
| hexcore-remill | Machine code → LLVM IR lifting (format-aware) | 0.2.0 |
| hexcore-helix | LLVM IR → C via C++23/MLIR (18 passes, C AST layer) | 0.8.0 |
| hexcore-better-sqlite3 | SQLite for session persistence & IOC storage | 2.0.0 |
v3.7.4 ████████████████████ Released — Format-Aware Lifting + Helix C AST
v3.8 ████████████░░░░░░░░ In Progress — Souper Superoptimizer + Rellic Removal
v3.9 ████░░░░░░░░░░░░░░░░ Planned — BinDiff Integration + Job Queue Manager
v4.0 ██░░░░░░░░░░░░░░░░░░ Research — Oracle Hook (Live AI Callbacks)
| Handle | Role | |
|---|---|---|
| 🐻 | LXrdKnowkill | Founder · Architecture · Everything |
| 🐺 | MayaRomanova | C++23 · MLIR · Helix Engine |
| 🦂 | ThreatBiih | Threat Intel · Unicorn Engine · Frontend |
| 🦆 | YasminePayload | Pipeline · Automation · Features |
HikariSystem is an open community working across security research, reverse engineering, malware analysis, and offensive tooling. If you're building something serious — you belong here.