Skip to content
@AkashaCorporation

AkashaCorporation


HikariSystem Field Arch


"To master the machine, one must first read its records."



What We Build

Akasha Corporation develops low-level security tooling for binary analysis, CPU emulation, reverse engineering, and offensive security. Our work lives at the boundary between software and hardware — where most tools stop, ours begins.

All projects operate under the HikariSystem philosophy: lean, composable, built for professionals.


Flagship — HexCore IDE v3.7.1

HikariSystem-HexCore is a full reverse engineering IDE purpose-built for malware analysis. Not a plugin. Not a wrapper around another tool. A complete analysis environment built from scratch on Code-OSS.

Static Analysis → CPU Emulation → IR Lifting → Decompilation → Automation Pipeline
Layer Technology Status
Disassembly Capstone v5 (N-API) ✅ Production
CPU Emulation Unicorn Engine (N-API) — 70+ API hooks ✅ Production
Assembly & Patching LLVM 18 MC (N-API) ✅ Production
IR Lifting Remill → LLVM IR (N-API) ✅ Stable
Decompilation Helix MLIR — C++23 pipeline (N-API) ✅ v0.6.0
Superoptimization Souper (Z3 SMT) 🔜 v3.8
Automation Pipeline .hexcore_job.json — headless batch analysis ✅ Production

Latest: v3.7.1 — Permissive memory mapping, faithful glibc/MSVCRT PRNG emulation, VM detection heuristics, junk instruction filtering, runtime memory disassembly, onResult conditional pipeline branching.


HikariSystem Arsenal

Project Description Stage
HexCore Full reverse engineering IDE v3.7.1
Scylla Studio Pentesting IDE — recon, HTTP testing, headless automation Active
Tsurugi Offensive security tooling Active
Ananke Threat intelligence & automation Active

Native Engine Suite

High-performance N-API bindings. No external installs. No wrappers. Built in-house.

Engine Role Version
hexcore-capstone Multi-arch disassembly (x86, ARM, RISC-V) 1.3.2
hexcore-unicorn CPU emulation with hook system 1.2.1
hexcore-llvm-mc Binary assembly & patching (LLVM 18) 1.0.0
hexcore-remill Machine code → LLVM IR lifting 0.1.2
hexcore-helix LLVM IR → pseudo-C (C++23/MLIR, 3-tier pipeline) 0.6.0

Roadmap

v3.7.1  ████████████████████  ✅ Dynamic Intelligence + Pipeline Branching
v3.8    ████████████░░░░░░░░  🔧 Souper Superoptimizer + searchMemoryHeadless
v3.9    ████░░░░░░░░░░░░░░░░  📋 BinDiff + Job Queue Manager
v4.0    ██░░░░░░░░░░░░░░░░░░  🔮 Oracle Hook (Live AI Callbacks)

Core Team

Handle Role
🐻 LXrdKnowkill Founder · Architecture · Everything
🐺 MayaRomanova C++23 · MLIR · Helix Engine
🦂 ThreatBiih Threat Intel · Unicorn Engine · Frontend
🦆 YasminePayload Pipeline · Automation · Features

Community

HikariSystem is an open community working across security research, reverse engineering, malware analysis, and offensive tooling. If you're building something serious — you belong here.

→ Browse all repositories


HikariSystem — Security Tools for Professionals | Copyright © 2026 AkashaCorporation. All rights reserved.

Pinned Loading

  1. HikariSystem-HexCore HikariSystem-HexCore Public

    The Native Reverse Engineering IDE. Zero-overhead binary analysis, full CPU emulation (PE/ELF), and headless automation. Powered by Capstone, Unicorn, LLVM & Remill via N-API.

    TypeScript 8 1

  2. hexcore-capstone hexcore-capstone Public

    C++ 3

  3. hexcore-llvm-mc hexcore-llvm-mc Public

    C++ 1

  4. hexcore-remill hexcore-remill Public

    C++ 1

  5. hexcore-unicorn hexcore-unicorn Public

    C++ 1

Repositories

Showing 10 of 10 repositories

Top languages

Loading…

Most used topics

Loading…