Skip to content
@AkashaCorporation

AkashaCorporation


Akasha Corporation — Hydra



HikariSystem Field Arch


"To master the machine, one must first read its records."



What We Build

Akasha Corporation develops low-level security tooling for binary analysis, CPU emulation, reverse engineering, and offensive security. Our work lives at the boundary between software and hardware — where most tools stop, ours begins.

All projects operate under the HikariSystem philosophy: lean, composable, built for professionals.


Flagship — HexCore IDE v3.8.0

HikariSystem-HexCore is a full reverse engineering IDE purpose-built for malware analysis. Not a plugin. Not a wrapper around another tool. A complete analysis environment built from scratch on Code-OSS.

Static Analysis → CPU Emulation → IR Lifting → Decompilation → Superoptimization → Dynamic Analysis → Automation Pipeline

Layer Technology Status
Disassembly Capstone v5 (N-API) Production
CPU Emulation Unicorn Engine 2.1.4 (N-API) — SharedArrayBuffer zero-copy hooks (Project Perseus) Production
Assembly & Patching LLVM 18 MC (N-API) Production
IR Lifting Remill → LLVM IR (N-API) — format-aware (PE64/ELF modes) Production
Decompilation Helix MLIR — C++23 pipeline, C AST layer, type recovery, SCC Tarjan v0.9.0
Superoptimization Souper (Z3 SMT + alive2) — LLVM IR rewrite verification v0.1.0
Dynamic Analysis Elixir (Project Azoth) — Unicorn + Interceptor + Stalker, clean-room Qiling replacement v1.0.0
Type Recovery DWARF 5 + PDB + ET_REL feeder (Pathfinder) — 3,864 sigs + 792 structs on mali_kbase.ko Production
Session Persistence SQLite-backed .hexcore_session.db — renames, retypes, bookmarks Production
Automation Pipeline .hexcore_job.json — headless batch analysis + Job Queue Manager Production

Latest: v3.8.0 "Souper Era + Pathfinder + Project Azoth + DWARF Type Pipeline" — Pathfinder DWARF/PDB/ET_REL metadata feeder (kernel modules now surface full debug content), Helix v0.9.0 with type recovery, Project Azoth clean-room dynamic analysis engine, Project Perseus zero-copy Unicorn hooks (1.34× throughput), Souper LLVM IR superoptimizer, Refcount Scanner, Anti-Analysis Detection, API Hash Resolver, Job Queue Manager for concurrent agentic pipelines.


HikariSystem Arsenal

Project Description Version
HexCore Full reverse engineering IDE — disassembly, emulation, decompilation, superoptimization v3.8.0
Scylla Studio Pentesting IDE — recon, HTTP testing, headless automation Active
Tsurugi Offensive security tooling Active
Ananke Threat intelligence & automation Active

Native Engine Suite

High-performance N-API bindings. No external installs. No wrappers. Built in-house. All engines published on npm.

Engine Role Version
hexcore-capstone Multi-arch disassembly (x86, ARM, RISC-V) 1.3.4
hexcore-unicorn CPU emulation with SharedArrayBuffer zero-copy hooks (Unicorn 2.1.4) 1.3.0
hexcore-llvm-mc Binary assembly & patching (LLVM 18) 1.0.1
hexcore-remill Machine code → LLVM IR lifting (format-aware) 0.4.0
hexcore-helix LLVM IR → C via C++23/MLIR (type recovery, SCC Tarjan, DCE) 0.9.0
hexcore-elixir Dynamic analysis — Unicorn + Interceptor + Stalker (Project Azoth) 1.0.0
hexcore-souper LLVM IR superoptimizer via Z3 SMT solving 0.1.0
hexcore-better-sqlite3 SQLite for session persistence & IOC storage 2.0.1

Roadmap


v3.7.4 ████████████████████ Released — Format-Aware Lifting + Helix C AST
v3.8.0 ████████████████████ Released — Souper + Pathfinder + Project Azoth + DWARF Pipeline

v3.8.1 ████░░░░░░░░░░░░░░░░ Planned — Queue polish (position field + pool size setting)
v3.9.0 ████░░░░░░░░░░░░░░░░ Planned — BinDiff Integration + Sticky Session Routing
v4.0.0 ██░░░░░░░░░░░░░░░░░░ Research — Oracle Hook (Live AI Callbacks)


Core Team

Handle Role
🐻 LXrdKnowkill Founder · Architecture · Everything
🐺 MayaRomanova C++23 · MLIR · Helix Engine
🦂 ThreatBiih Threat Intel · Unicorn Engine · Frontend
🦆 YasminePayload Pipeline · Automation · Features

Community

HikariSystem is an open community working across security research, reverse engineering, malware analysis, and offensive tooling. If you're building something serious — you belong here.

Browse all repositories →


HikariSystem — Security Tools for Professionals Copyright © 2026 Akasha Corporation. All rights reserved.

Pinned Loading

  1. HikariSystem-HexCore HikariSystem-HexCore Public

    The Native Reverse Engineering IDE. Zero-overhead binary analysis, full CPU emulation (PE/ELF), and headless automation. Powered by Capstone, Unicorn, LLVM & Remill via N-API.

    TypeScript 8 1

  2. hexcore-capstone hexcore-capstone Public

    C++ 3

  3. hexcore-llvm-mc hexcore-llvm-mc Public

    C++ 2

  4. hexcore-remill hexcore-remill Public

    C++ 2

  5. hexcore-unicorn hexcore-unicorn Public

    C++ 2

Repositories

Showing 10 of 14 repositories

Top languages

Loading…

Most used topics

Loading…