Makoto Sugita (a.k.a. Mr.Rabbit)
Independent Security Researcher (hobbyist)
Projects
Azazel Series — Cyber Scapegoat Gateway
- GitHub: https://github.com/01rabbit/Azazel
- Concept: “Delay to win” — deceive, contain, and buy time. Gateway that absorbs attacks and orchestrates tactical delaying actions.
- Tech: Suricata, OpenCanary, Vector, Python (Scapy), Mattermost alerts, iptables/nftables, tc.
Azazel-Pi

- GitHub: https://github.com/01rabbit/Azazel-Pi
- Concept: “Azazel-Pi” — a Raspberry Pi–based, rapid-deploy SOC/NOC gateway designed for disaster and emergency environments.
- Purpose: Acts as a “Cyber Scapegoat Gateway” that absorbs and delays attacks to protect critical services, with easy deployment for municipalities and small organizations.
- Use Cases: Emergency shelters, small-scale SOC/NOC operations, rapid network defense in resource-limited settings.
- Recognition: Presented in Japan and internationally as an example of sustainable active cyber defense and tactical delaying action.
Azazel-Zero

- GitHub: https://github.com/01rabbit/Azazel-Zero
- Concept: “Azazel-Zero” — a compact, USB-OTG Raspberry Pi Zero–based countermeasure gadget designed as a stealthy decoy and portable network responder.
- Purpose: Offer a low-power, highly portable deception device that exposes believable services, collects telemetry, and executes tactical delaying actions in constrained or covert deployments.
- Use Cases: Field exercises, red-team support, portable deception during on-site assessments, quick-deploy educational demos.
- Recognition: Shown in practical demos and workshops; valued for its portability and minimal footprint in constrained environments.
PAKURI Series — Pentesting Automation Frameworks
PAKURI

- GitHub: https://github.com/01rabbit/PAKURI
- Concept: “Numeric Keypad Navigation System” — transforms Kali-based tools into a fully navigable TUI controlled by just the keypad.
- Purpose: Streamlines penetration testing via intuitive, semi-automated workflows.
- Use Cases: Red/Blue team simulations, beginner training, fast prototyping.
- Recognition: Presented at Black Hat Asia Arsenal 2020.
KaliPAKU

- GitHub: https://github.com/01rabbit/KaliPAKU
- Concept: “Type-22 Karipaku” — a training-focused, keypad-navigable launcher that simplifies pentesting workflows by assigning 3–5 digit codes to Kali Linux tools.
- Purpose: Makes learning and practicing penetration testing accessible, fast, and repeatable—ideal for beginners, educators, and validation teams.
- Use Cases: Red/Blue team exercises, classroom training, skill maintenance, and attack simulation.
- Recognition: Designed to conform with NIST SP 800-115 and released in April 2023 as the PAKURI Series’ “Mark-V” version.
BOCCHI — Chat-driven Penetration Testing Bot

- GitHub: https://github.com/01rabbit/BOCCHI
- Concept: “Type-23 BOCCHI” — a Mattermost-integrated chatbot that turns natural language into operational pentest commands.
- Purpose: Democratize access to reconnaissance and vulnerability scanning through chat-based interactions.
- Use Cases: Solo pentesters, mobile-first workflows, red team support, Mattermost-based ops automation.
- Recognition: Released in December 2023 as the PAKURI Series’ “Mark-VI” model, with GPT-powered roadmap under development.
Babbly — Voice-Guided Pentest Assistant

- GitHub: https://github.com/01rabbit/Babbly
- Concept: “Type-24 Babbly” — a penetration testing tool that embraces Artificial Incompetence to achieve safe, offline voice-guided operation.
- Purpose: Allows users to conduct tests by voice without relying on AI or constant screen interaction, making it ideal for constrained environments.
- Use Cases: Air-gapped environments, EMP-hardened zones, hands-free security ops, visually impaired support.
- Recognition: Released as the PAKURI Series’ “Mark-VII” model with full Japanese voice synthesis and SOP-based test automation.
Presentations
2019
2020
2023
2024
2025
About / Short Bio
I am an independent security researcher and former penetration tester who now develops security tools as a personal research endeavor. My work has been showcased at conferences including Black Hat Asia Arsenal, BSides Tokyo, SECCON, and more recently at BSides Las Vegas, Black Hat USA Arsenal, and SecTor Arsenal. All of this activity is self-funded — which means the more I speak around the world, the more my bank account suffers. As my follower count on X rises, so does my alcohol consumption, and that’s probably the most consistent metric in my career.
Photos
Professional Headshot

At Conferences

Black Hat USA Arsenal 2025 — Las Vegas (Arsenal Showcase)

BSides Las Vegas 2025 — Proving Ground: On stage with Azazel System

SecTor Canada 2025 — Arsenal Showcase: Demoing Azazel System

Final testing of Azazel-Zero before deployment
Just for Fun

“Deploying scapegoats since 2020 — and yes, it works.”