Advertisement · 728 × 90

Posts by Tim Blazytko

AI vs AI - Binary Ninja Live Stream
AI vs AI - Binary Ninja Live Stream YouTube video by VECTOR 35

Thanks to @elykdeer.bsky.social and the @binary.ninja team for having me on the AI vs AI Binary Ninja stream. Great discussion on agentic RE, tooling, and feedback loops.

www.youtube.com/watch?v=TBqB...

2 weeks ago 2 2 0 0

This Thursday I'm joining @binary.ninja's live to put LLM-powered reverse-engineering workflows head-to-head.

We compare Binja's client-side LLM integrations vs. fully headless agents

Expect practical workflow comparisons, lots of fun, and a bit of chaos.

3 weeks ago 1 0 0 0
Agentic Reverse Engineering: How AI Agents Are Changing Binary Analysis
Agentic Reverse Engineering: How AI Agents Are Changing Binary Analysis YouTube video by mr_phrazer

The recording of my first Binary Cartography webinar is now public:

Agentic Reverse Engineering: How AI Agents Are Changing Binary Analysis

Topics: keygenning, cracking & anti-tamper removal

Recording: www.youtube.com/watch?v=DZcD...

Slides/code/samples: github.com/mrphrazer/bi...

3 weeks ago 7 1 0 1

Agentic reverse engineering can do a lot, but obfuscation still breaks many analysis workflows in malware and commercial software.

If you want to learn how to build & steer automation for analyzing protected code, check out my training at @reconmtl.bsky.social :

recon.cx/2026/en/trai...

4 weeks ago 6 2 0 0
Post image

New blog post: Building a Pipeline for Agentic Malware Analysis

Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage

Link: synthesis.to/2026/03/18/a...

Github: github.com/mrphrazer/ag...

1 month ago 5 3 0 0

I also published my Ghidra Headless MCP that follows similar design principles: github.com/mrphrazer/gh...

1 month ago 4 0 1 0
Preview
GitHub - mrphrazer/binary-ninja-headless-mcp: Headless Binary Ninja MCP server — giving AI agents deep reverse-engineering capabilities via 180 tools. Headless Binary Ninja MCP server — giving AI agents deep reverse-engineering capabilities via 180 tools. - mrphrazer/binary-ninja-headless-mcp

Recently my RE workflow moved into sandboxed VMs where agents have full control over the environment. I needed an MCP server that runs headless in the same sandbox and exposes way more of the #BinaryNinja API than others.

Here's the release: github.com/mrphrazer/bi...

1 month ago 3 0 0 1
Post image

New chapter: I've transitioned to a part-time Chief Scientist role at @emproofsecurity.bsky.social .

I’m shifting my focus to my independent work in reverse engineering:

trainings • consulting • tooling • research

Details: synthesis.to

2 months ago 2 1 0 0
Advertisement
Post image

Happy to bring my Software Deobfuscation Techniques training back to @reconmtl.bsky.social - June 15–18, 2026 in Montreal!

Learn systematic approaches to defeating modern obfuscation found in DRM/anti-tamper & APT malware.

recon.cx/2026/en/trai...

2 months ago 5 1 1 1
Binary Ninja Live Stream: Nov 14th, 2025
Binary Ninja Live Stream: Nov 14th, 2025 YouTube video by VECTOR 35

Happy to share that later today (Friday, Nov 14, at 10:00 PM CET / 16:00 ET), I’ll be live on the #BinaryNinja livestream to talk about (anti-)reverse engineering & code (de)obfuscation. I'll also showcase some of my plugins.

www.youtube.com/watch?v=GQtX...

5 months ago 1 0 0 0

Impressive reverse engineering kung fu against widevine L3 by Felipe (x.com/_localo_) ! #hacklu
Cc @mrphrazer.bsky.social

5 months ago 3 2 1 0
Recon 2025 - Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications
Recon 2025 - Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications YouTube video by Recon Conference

The recording of our (CC @nicolo.dev ) talk "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @reconmtl.bsky.social is now online!

Recording: www.youtube.com/watch?v=QxSG...

Slides: synthesis.to/presentation...

#BinaryNinja Plugin: github.com/mrphrazer/ob...

6 months ago 7 6 0 1
Video

The new version of my #BinaryNinja plugin Obfuscation Analysis (v1.2) adds recursive function inlining in the decompiler.

It collapses call-heavy code into a single function; analysis, constant propagation, DCE and other analyses work across boundaries.

github.com/mrphrazer/ob...

6 months ago 5 3 1 0
Preview
GitHub - emproof-com/workshop_firmware_reverse_engineering: Workshop on firmware reverse engineering Workshop on firmware reverse engineering. Contribute to emproof-com/workshop_firmware_reverse_engineering development by creating an account on GitHub.

We at @emproofsecurity.bsky.social open-sourced a free firmware reverse engineering workshop for self-study.

Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included.

github.com/emproof-com/...

6 months ago 5 2 0 0

Reminder: If you’re interested in learning how to analyze and deal with obfuscated code, you’re welcome to join my training at @hexacon.bsky.social from October 6-9.

You can still register here: www.hexacon.fr/trainer/blaz...

8 months ago 2 0 0 0
Advertisement

Congrats!

8 months ago 1 0 0 0
A side-by-side view of Ghidra's decompiler. Left is the raw output, right is the output enhanced by the LLM.

A side-by-side view of Ghidra's decompiler. Left is the raw output, right is the output enhanced by the LLM.

Based on research by @mrphrazer.bsky.social and @mu00d8.bsky.social, presented at RECon 2024, I used graph theory code from Ghidra's codebase to select the order in which functions are sent to the LLM, ensuring as much context as possible is retained. The script is aptly named GhidrAI!

5/n

9 months ago 3 1 1 0
Post image

The slides from our @reconmtl.bsky.social talk, "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" (CC @nicolo.dev ), are now online!

Slides: synthesis.to/presentation...

Plugin: github.com/mrphrazer/ob...

9 months ago 10 5 0 1
Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications Recon 2025 From gaming anti-cheat and DRM solutions to malware, Mixed Boolean-Arithmetic (MBA) obfuscation hides critical computations behind intricate Boolean and arithmetic transformations. In this talk, we de...

Tomorrow at 3:30 pm, @nicolo.dev and I will present our talk “Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications” at @reconmtl.bsky.social !

Details: cfp.recon.cx/recon-2025/t...
Plugin release: github.com/mrphrazer/ob...

9 months ago 10 3 0 0

Reminder: If you’re interested in code deobfuscation, you’re welcome to join my training at @reconmtl.bsky.social Montréal from June 24-27.

You can still register here: recon.cx/2025/trainin...

10 months ago 1 0 0 0

Honored to join @jstrosch.bsky.social on his podcast "Behind the Binary"! We discussed my RE journey, identifying & analyzing obfuscated code, software protection in industry vs malware, the dynamic between building & breaking protections, and others.

open.spotify.com/episode/7yJB...

10 months ago 5 1 0 0
Video

New #BinaryNinja plugin: Obfuscation Analysis

Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly.

Co-authored by @nicolo.dev; available in the plugin manager.

github.com/mrphrazer/ob...

10 months ago 21 9 1 1
Post image

Excited to teach my class on software deobfuscation in Paris at @hexacon.bsky.social , Oct 6–9, 2025!
Learn advanced techniques to defeat state-of-the-art obfuscation in DRMs & APT malware.

www.hexacon.fr/trainer/blaz...

11 months ago 8 0 0 1

Reminder: Training registrations are still open for my deobfuscation training at REcon Montreal. Secure your spot before prices go up on May 1!

11 months ago 2 0 0 0
Post image

At @reconmtl.bsky.social, @nicolo.dev and I discuss the current state of MBA (de)obfuscation and their applications. We’ll also introduce a new #BinaryNinja plugin for simplifying MBAs in the decompiler.

Details: cfp.recon.cx/recon-2025/f...

I'll also give a training: recon.cx/2025/trainin...

1 year ago 7 4 0 1
Advertisement
Post image

New heuristic in my #BinaryNinja plugin obfuscation_detection:
Duplicated Subgraphs uses iterative context hashing to spot repeated multi-block code. We merge each block’s signature with its successors over multiple rounds for efficiency.

Link: github.com/mrphrazer/ob...

1 year ago 9 6 1 0

RE//verse training registration closes today! Have to finalize count for the hotel. If you still want to join after registration closes, contact us ASAP as some extra slots may be available. https://re-verse.io/#trainings

1 year ago 2 2 0 0
Post image

My class on code deobfuscation at REcon Montreal (June 24-27) is now open for registration! Learn how to analyze obfuscated code and break it by writing custom tools using symbolic execution, SMT solving, and program synthesis.

Details & Register: recon.cx/2025/trainin...

1 year ago 9 1 0 2
Webinar: Software Protection -- Safeguarding Code Against Reverse Engineering
Webinar: Software Protection -- Safeguarding Code Against Reverse Engineering YouTube video by emproof

Last Thursday, I gave a webinar on anti-reverse engineering techniques like obfuscation, anti-debug, anti-tamper etc, including practical examples. Recording, slides and examples are now available.

Recording: www.youtube.com/watch?v=Ie1e...

Slides, Code & Samples: github.com/emproof-com/...

1 year ago 5 1 1 0

The line-up for @re-verse.io is impressive, but one talk I’m particularly excited about is from Vikas Gupta and Peter Garba:

“Standing on the Shoulders of Giants: De-Obfuscating WebAssembly using LLVM”

re-verse.sessionize.com/session/763329

1 year ago 4 0 0 0