Mr.Rabbit

mr.rabbit@01rabbit:~$ whoami

Makoto Sugita
a.k.a.

Independent Security Researcher & Open-Source Security Tool Developer

Defensive Security Deception Open Source Edge SOC/NOC Black Hat Arsenal BSides LV SECCON SecTor
scroll

projects

azazel-series/

"Delay to win" — deceive, contain, and buy time. Gateway that absorbs attacks and orchestrates tactical delaying actions.

Azazel System core gateway doctrine and tool family for delaying action, deception, and edge defense.

BH USA 2025 BSides LV 2025 SecTor 2025 CyberTAMAGO 2025 Suricata OpenCanary Python / Scapy Mattermost iptables / nftables
Azazel-Edge [site ↗] [github ↗]

Successor to Azazel-Pi — deterministic edge SOC/NOC gateway with explainable decision-making and optional local AI assist.

Azazel Successor Raspberry Pi Suricata Ollama Flask Edge SOC/NOC Deterministic Control Version: v0.1.2
Azazel-Pi archived
[github ↗]

Archived prototype and predecessor of Azazel-Edge. Presented as an offline edge AI SOC/NOC gateway for constrained and emergency environments.

Raspberry Pi Emergency Deploy SOC / NOC BH Asia 2026 BSides Tokyo 2025 SecTor 2025 AVTOKYO 2025 CODE BLUE Bluebox 2025 Version: azazel-pi-eol-2026-05-16
Azazel-Gadget [site ↗] [github ↗]

Portable tactical defense gateway for untrusted Wi-Fi — modes: Portal / Shield / Scapegoat.

CyberTAMAGO 2026 Pi Zero 2 W nftables OpenCanary Flask e-paper Version: v0.1.0
Azazel-Zero archived
[github ↗]

Archived predecessor of Azazel-Gadget — compact USB-OTG Pi Zero gadget for portable deception and local network response.

Pi Zero USB-OTG Deception
pakuri-series/

Penetration testing automation frameworks — from keypad-driven TUIs to voice and chat-guided operations.

PAKURI [github ↗]

Numeric Keypad Navigation System for Kali-based tools. Black Hat Asia Arsenal 2020.

Kali Linux TUI BH Asia 2020 AVTOKYO 2019/2020 Version: v2.0.0
KaliPAKU [github ↗]

Training-focused launcher with 3–5 digit codes. Conforms to NIST SP 800-115.

Training NIST SP 800-115 CyberTAMAGO 2023 SECCON 2022 Version: v1.0.8
BOCCHI [github ↗]

Mattermost chatbot: natural language → operational pentest commands.

Mattermost ChatBot GPT CyberTAMAGO 2023 AVTOKYO 2023 SECCON 2023 Version: v1.0.0
Babbly [github ↗]

Voice-guided pentest assistant with Artificial Incompetence — fully offline, air-gap friendly.

Voice Offline Air-gap CyberTAMAGO 2024 AVTOKYO 2024
phasmid/

Janus Eidolon System — local-only coercion-aware storage for controlled disclosure under compelled access and device seizure scenarios.

Coercion-aware local storage system that separates visible disclosure from protected local state. Designed for field-risk evaluators and security researchers facing compelled access or seizure scenarios.

Python 3.10+ Argon2id AES-GCM TUI / CLI Pi Zero 2 W Local-only Version: v0.1.4

presentations

photos

Profile Photo
Professional headshot
Black Hat USA 2025
Black Hat USA Arsenal 2025 — Las Vegas
BSides LV 2025
BSides Las Vegas 2025 — Proving Ground
SecTor 2025
SecTor Canada 2025 — Arsenal Showcase
Azazel-Zero testing
Final testing of Azazel-Zero before deployment
Goat Selfie
"Deploying scapegoats since 2020 — and yes, it works."

about

I am an independent security researcher and open-source security tool developer focused on defensive security, deception, constrained SOC/NOC operations, and coercion-aware security design. My work turns offensive experience into defensive tools that buy time, preserve visibility, and make attackers waste effort in carefully controlled places.


I build systems such as Azazel System, a cyber scapegoat gateway for delaying action and deception-aware edge defense; Phasmid, a coercion-aware local storage project; and earlier pentesting support tools including PAKURI, KaliPAKU, BOCCHI, and Babbly.


These projects have appeared at conferences including Black Hat Arsenal, BSides Las Vegas, BSides Tokyo, SECCON, AVTOKYO, CODE BLUE, and SecTor. The research is mostly self-funded, which proves two things: the tools are portable, and so are the bills.

contact