Skip to content

YasminePayload/HikariSystem-HexCore

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

81 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HikariSystem HexCore

HikariSystem HexCore

A specialized IDE for malware analysis, reverse engineering, and binary emulation

Features | Extensions | Debugger | Automation | Installation | Usage | License

binary analysis · reverse engineering · malware analysis · CPU emulation · PE/ELF · CTF tools · disassembler · debugger


Overview

HikariSystem HexCore is a comprehensive binary analysis IDE built on VS Code. It provides security researchers with a unified environment for malware analysis, reverse engineering, and threat hunting — from static analysis to full CPU emulation.

Latest stability update (2026-02-10): v3.2.2 pipeline hotfix release.

What makes HexCore different:

  • Full PE and ELF emulation with 65+ API hooks (Windows + Linux)
  • Native Capstone/Unicorn/LLVM MC engines via N-API (no external installs)
  • Headless automation pipeline for batch analysis
  • Tested against real CTF binaries (HackTheBox)

Features

  • Disassembly — Native multi-architecture disassembler (x86, x64, ARM, ARM64, MIPS, RISC-V)
  • Emulation — CPU emulation via Unicorn Engine with PE and ELF loading, API hooking, stdin emulation
  • Assembly Patching — Inline patching with LLVM MC backend, NOP sleds, multi-arch support
  • PE/ELF Analysis — Import/export parsing, section analysis, packer detection, PIE support
  • Hex Viewer — Virtual scrolling, data inspector, bookmarks, structure templates
  • Hash Calculator — MD5, SHA-1, SHA-256, SHA-512 with VirusTotal integration
  • String Extraction — ASCII/UTF-16, auto-categorization, cross-reference tracking
  • Entropy Analysis — Block-by-block entropy with packer/encryption detection
  • YARA Scanning — Rule loading, match highlighting, custom rules
  • Automation — Headless pipeline system for batch binary analysis

Extensions

Analysis Tools

Extension Version Description
Debugger 2.0.1 PE/ELF emulation with Unicorn Engine, 65+ API hooks, stdin emulation
Disassembler 1.3.0 Multi-arch disassembler with inline PE/ELF parsing, function detection, string xrefs
Hex Viewer 1.2.1 Professional binary file viewer with virtual scrolling
PE Analyzer 1.1.0 Comprehensive PE executable analysis with headless mode
Strings Extractor 1.1.0 Memory-efficient string extraction with cross-references
Hash Calculator 1.1.0 Fast file hashing with VirusTotal integration
Entropy Analyzer 1.1.0 Streaming entropy analysis with adaptive block sizing and modular report pipeline
File Type Detector 1.0.0 Magic bytes signature detection
Base64 Decoder 1.0.0 Detect and decode Base64 strings
YARA Scanner 2.1.0 YARA scanning with DefenderYara integration and headless pipeline support

Native Engines (Standalone N-API Packages)

These engines ship with HexCore and can also be used independently in Node.js projects.

Package Version Description
hexcore-capstone 1.3.0 Capstone v5 N-API binding — async disassembly, detail mode, all architectures
hexcore-unicorn 1.0.0 Unicorn N-API binding — CPU emulation, hooks, context save/restore
hexcore-llvm-mc 1.0.0 LLVM 18.1.8 MC N-API binding — multi-arch assembly and patching
hexcore-keystone 1.0.0 Legacy assembler binding (superseded by LLVM MC)

Debugger & Emulator

The HexCore Debugger provides full CPU emulation for PE (Windows) and ELF (Linux) binaries via Unicorn Engine. No native debugger or target OS required — everything runs in-process.

Supported Formats

  • PE (x86/x64) — Automatic section loading, import resolution via IAT, 25+ Windows API hooks
  • ELF (x86_64) — PIE support, PLT/GOT resolution (.rela.plt + .rela.dyn), 40+ Linux API hooks
  • Raw binaries — Direct memory mapping for shellcode and firmware

Emulation Capabilities

  • Step / Continue / Breakpoints — Standard debugger controls with register and memory inspection
  • API Hooking — Transparent interception of library calls (no real DLLs/SOs needed)
  • stdin Emulation — Configurable input buffer for scanf, read(0), getchar, fgets
  • TLS/FS_BASE — Automatic Thread Local Storage with stack canary for -fstack-protector binaries
  • Syscall Handler — Linux syscall interception (read, write, mmap, brk, arch_prctl, exit)
  • __libc_start_main redirect — Skip CRT init, jump directly to main() with argc/argv/envp
  • Snapshot save/restore — Save and restore full emulation state

Linux API Hooks (40+)

I/O, string, memory, heap, conversion, process, time, file stubs, and security functions — all using System V AMD64 ABI argument passing.

Windows API Hooks (25+)

Kernel32, user32, msvcrt emulation for common PE analysis scenarios.

Powered by hexcore-unicorn and hexcore-capstone.


Disassembler

Native multi-architecture disassembler powered by Capstone Engine v5.0 with assembly patching via LLVM MC.

  • Architectures: x86, x64, ARM, ARM64, MIPS, RISC-V
  • Inline PE/ELF parsing — Imports, exports, sections without external dependencies
  • Function detection — Prolog scanning, call target analysis, up to 1000 functions
  • String cross-references — Track which instructions reference which strings
  • Graph View — IDA-style control flow graph visualization
  • Patching — Assemble, patch instructions, NOP sleds (LLVM MC)
  • Headless modehexcore.disasm.analyzeAll for automation with JSON/MD output

Powered by hexcore-capstone and hexcore-llvm-mc.


Automation Pipeline

HexCore supports headless batch analysis via .hexcore_job.json job files.

{
  "file": "C:\\bin\\sample.exe",
  "outDir": "C:\\reports\\sample",
  "steps": [
    { "cmd": "hexcore.filetype.detect" },
    { "cmd": "hexcore.peanalyzer.analyze" },
    { "cmd": "hexcore.hashcalc.calculate" },
    { "cmd": "hexcore.entropy.analyze" },
    { "cmd": "hexcore.strings.extract", "args": { "minLength": 5 } },
    { "cmd": "hexcore.disasm.analyzeAll" },
    { "cmd": "hexcore.yara.scan" }
  ]
}
  • Auto-trigger — Workspace watcher detects .hexcore_job.json on creation
  • Step controls — Per-step timeout, error handling, output validation
  • Extension preflight — Auto-activates required extensions before each step
  • Capability audithexcore.pipeline.listCapabilities exports headless/interactive capability map
  • Safety model — Interactive commands are explicitly blocked in pipeline mode with clear errors
  • Output — JSON/Markdown reports + hexcore-pipeline.status.json + hexcore-pipeline.log

All analysis extensions support headless execution with file, output, and quiet parameters.

See docs/HEXCORE_AUTOMATION.md for full documentation.


Hex Viewer

Professional binary file viewer with virtual scrolling for large files.

  • Virtual Scrolling — Handles files of any size efficiently
  • Data Inspector — View bytes as Int8/16/32/64, Float, Unix timestamp
  • Bookmarks — Save and navigate to important offsets
  • Structure Templates — Parse common binary structures
  • Search — Find hex patterns (e.g., 4D 5A for PE headers)
  • Go to Offset — Jump directly to any offset
  • Copy Selection — Export as Hex, C Array, or Python bytes
  • Little/Big Endian toggle

Installation

Development Mode

# Clone the repository
git clone https://github.com/LXrdKnowkill/HikariSystem-HexCore.git
cd HikariSystem-HexCore

# Install dependencies
npm install

# Run in development mode
$env:VSCODE_SKIP_NODE_VERSION_CHECK="1"
.\scripts\code.bat

Requirements

  • Node.js 18.x or higher
  • npm 8.x or higher
  • Windows 10/11
  • Visual Studio Build Tools 2022 (for native modules)
  • Python 3.x (for node-gyp)

Project Structure

HikariSystem-HexCore/
├── extensions/
│   ├── hexcore-debugger/       # Emulation-based debugger (PE/ELF)
│   ├── hexcore-disassembler/   # Multi-arch disassembler + patching
│   ├── hexcore-hexviewer/      # Binary file viewer
│   ├── hexcore-peanalyzer/     # PE file analyzer
│   ├── hexcore-capstone/       # Capstone N-API binding
│   ├── hexcore-llvm-mc/        # LLVM MC N-API binding
│   ├── hexcore-unicorn/        # Unicorn N-API binding
│   ├── hexcore-keystone/       # Legacy assembler binding
│   ├── hexcore-yara/           # YARA scanner
│   ├── hexcore-hashcalc/       # Hash calculator
│   ├── hexcore-strings/        # Strings extractor
│   ├── hexcore-entropy/        # Entropy analyzer
│   ├── hexcore-base64/         # Base64 decoder
│   └── hexcore-filetype/       # File type detector
├── .agent/
│   └── skills/hexcore/         # AI skill for agent integration
├── docs/                       # Documentation
├── src/                        # Core IDE source
├── resources/                  # Icons and assets
├── build/                      # Build scripts
└── product.json                # Product configuration

AI Agent Integration

HexCore includes an AI skill definition for integration with AI agents (Claude Code, etc.). The skill provides:

  • Complete command reference for all HexCore extensions
  • Emulator memory layout and API hook documentation
  • Typical analysis workflow guides
  • Automation pipeline job file generation

See .agent/skills/hexcore/SKILL.md for details.


Usage

Debugger

  • Open any PE or ELF binary
  • Run "HexCore: Start Emulation" to begin CPU emulation
  • Use Step, Continue, and Breakpoints for dynamic analysis
  • Set stdin input with "HexCore: Set Stdin Buffer" for interactive binaries

Disassembler

  • Right-click any executable file
  • Select "HexCore: Disassemble File"
  • Use function tree, string references, and graph view for navigation

Hex Viewer

  • Right-click any file and select "HexCore: Open Hex View"
  • Or use "Open With..." > "HexCore Hex Editor"

PE Analyzer

  • Right-click any .exe, .dll, .sys, or .ocx file
  • Select "HexCore: Analyze PE File"

Hash Calculator

  • Right-click any file
  • Select "HexCore: Calculate File Hashes"

Strings Extractor

  • Right-click any file
  • Select "HexCore: Extract Strings"

Automation

  • Create a .hexcore_job.json in your workspace
  • HexCore auto-detects and runs it, or run manually via "Run HexCore Automation Job"

Contributing

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/your-feature)
  3. Commit your changes (git commit -m 'Add your feature')
  4. Push to the branch (git push origin feature/your-feature)
  5. Open a Pull Request

License

This project is licensed under the MIT License. See the LICENSE.txt file for details.


HikariSystem — Security Tools for Professionals

About

The Native Reverse Engineering IDE. Zero-overhead binary analysis, full CPU emulation (PE/ELF), and headless automation. Powered by Capstone, Unicorn & LLVM via N-API.

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • TypeScript 95.0%
  • CSS 1.4%
  • JavaScript 1.1%
  • Inno Setup 0.7%
  • Rust 0.6%
  • HTML 0.5%
  • Other 0.7%