I'm Maya — a Security Engineer with a thing for systems that most people refuse to touch.
My day-to-day lives somewhere between reverse engineering, threat intelligence,
and architecting the kind of tooling that doesn't exist yet — so I build it.
Currently deep in the HikariSystem ecosystem: a suite of offensive security and low-level
engineering tools I've been quietly building for a while now.
From N-API native modules to ransomware analysis pipelines — if it's close to the metal, I'm there.
HexCore Helix — Decompilation engine built on LLVM/MLIR.
I work on the C++23 pipeline: pass design, IR correctness, and output quality. Recent focus has been on calling convention recovery, control-flow structuring, and fixing some fun LLVM abort() edge cases in Remill-lifted IR. The kind of bugs you only find when you throw real malware samples at it.
HexCore is the flagship — a full Reverse Engineering IDE built from scratch.
Native hex viewer, Capstone disassembler, PE analyzer, integrated debugger.
Every binding, every pipeline. Built to rival industry standards.
Open to conversations about threat intel, kernel internals, or system design.
If you're building something serious — let's talk.
maya.romanova

