Tim Blazytko
About
Binary Security Researcher, Trainer
Location
Bochum, Germany
2025-11-16

I’ll be teaching my next deobfuscation class at @REverseConf (Orlando), Mar 2–5, 2026. Learn to dissect modern protections, devirtualize VMs, and simplify MBA expressions using symbolic execution, SMT solving, and synthesis.

Details: shop.binary.ninja/products/re-

#reverseengineering #malware #malwareanalysis

2025-11-13

Happy to share that later today (Friday, Nov 14, at 10:00 PM CET / 16:00 ET), I’ll be live on the #BinaryNinja livestream to talk about (anti-)reverse engineering & code (de)obfuscation. I'll also showcase some of my plugins.

youtube.com/watch?v=GQtX7S_oXbY

2025-10-15

The recording of our (CC @nicolodev talk "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @recon is now online!

Recording: youtube.com/watch?v=QxSGWk3MqaQ

Slides: synthesis.to/presentations/rec

#BinaryNinja Plugin: github.com/mrphrazer/obfuscati

#reverseengineering #malware

2025-10-11

The new version of my #BinaryNinja plugin Obfuscation Analysis (v1.2) adds recursive function inlining in the decompiler.

It collapses call-heavy code into a single function; analysis, constant propagation, DCE and other analyses work across boundaries.

github.com/mrphrazer/obfuscati

#reverseengineering

2025-09-30

We at emproof open-sourced a free firmware reverse engineering workshop for self-study.

Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included.

github.com/emproof-com/worksho

#reverseengineering

2025-06-27

The slides from our @recon talk, "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" (CC @nicolodev are now online!

Slides: synthesis.to/presentations/rec

Plugin: github.com/mrphrazer/obfuscati

2025-06-26

Tomorrow at 3:30 pm, Nicolò Altamura and I will present our talk “Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications” at @recon

Details: cfp.recon.cx/recon-2025/talk/B
Plugin release: github.com/mrphrazer/obfuscati

Tim Blazytko boosted:
2025-06-05

My class on code deobfuscation at REcon Montreal (June 24-27) is now open for registration! Learn how to analyze obfuscated code and break it by writing custom tools using symbolic execution, SMT solving, and program synthesis.

Details & Register: recon.cx/2025/trainingSoftware

2025-05-25

New #BinaryNinja plugin: Obfuscation Analysis

Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly.

Co-authored by @nicolodev ; available in the plugin manager.

Check it out: github.com/mrphrazer/obfuscati

#reverseengineering #malware #cybersecurity

2025-05-05

Excited to teach my class on software deobfuscation in Paris at @hexacon_fr Oct 6–9, 2025!
Learn advanced techniques to defeat state-of-the-art obfuscation in DRMs & APT malware.

hexacon.fr/trainer/blazytko/

#reverseengineering #malware #malwareanalysis #softwaresecurity

2025-04-07

At @recon , @nicolodev and I discuss the current state of MBA (de)obfuscation and their applications. We’ll also introduce a new #BinaryNinja plugin for simplifying MBAs in the decompiler.

Details: cfp.recon.cx/recon-2025/featur

I'll also give a training: recon.cx/2025/trainingSoftware

#reverseengineering #malware

2025-03-14

New heuristic in my #BinaryNinja plugin obfuscation_detection:

Duplicated Subgraphs uses iterative context hashing to spot repeated multi-block code. We merge each block’s signature with its successors over multiple rounds for efficiency.

Link: github.com/mrphrazer/obfuscati

#reverseengineering

2025-02-18

My class on code deobfuscation at REcon Montreal (June 24-27) is now open for registration! Learn how to analyze obfuscated code and break it by writing custom tools using symbolic execution, SMT solving, and program synthesis.

Details & Register: recon.cx/2025/trainingSoftware

2025-01-27

Last Thursday, I gave a webinar on anti-reverse engineering techniques like obfuscation, anti-debug, anti-tamper etc, including practical examples. Recording, slides and examples are now available.

Recording: youtube.com/watch?v=Ie1eZSiMEJ8

Slides, code & samples: github.com/emproof-com/webinar

2025-01-10

The line-up for RE//verse is impressive, but one talk I’m particularly excited about is from Vikas Gupta and Peter Garba:

“Standing on the Shoulders of Giants: De-Obfuscating WebAssembly using LLVM”

re-verse.sessionize.com/sessio

#reverseengineering

2024-12-09

I can also be found on Bluesky: bsky.app/profile/mrphrazer.bsk

2024-05-02

New version of my #BinaryNinja plugin obfuscation_detection.

New features detect:
* RC4 implementations (KSA + PRGA)
* functions with a high loop frequency (potential performance bottlenecks)
* irreducible loops (aggressive optimizations & obfuscation)

github.com/mrphrazer/obfuscati

#malware #malwareanalysis

2024-04-10

Happy to present "Unleashing AI: The Future of Reverse Engineering with Large Language Models" with @mu00d8 at
@recon We'll cover current & future RE applications, running offline models and enhancing results by merging LLMs with static analysis.

recon.cx/2024/presentations.ht

#reverseengineering #malwareanalysis #malware #AI #LLM #REcon2024

2024-03-25

🚀 Join me at TyphoonCon 2024 in South Korea for an intensive Software Deobfuscation Techniques training from May 27-29!

You'll learn how to analyze and break obfuscated code. Key learnings include

🔍 Unveiling state-of-the-art strategies in code obfuscation and their undoing.

🛠️ Mastering compiler optimizations and SMT-based program analysis.

⚙️ Harnessing the power of symbolic execution and program synthesis for practical problem-solving.

📐 Crafting disassemblers for VM-based obfuscation and simplify complex arithmetic expressions.

🔗 Details & Registration: typhooncon.com/blog/conitems/s

#reverseengineering #softwaredeobfuscation #gamesecurity #anticheat #softwaresecurity #malwareanalysis #antipiracy #malware #training #TyphoonCon24

2024-03-19

New #BinaryNinja plugin: ReverserAI. It uses local large language models (LLMs) to derive semantically meaningful function names from decompiler output, demonstrating the potential of local LLMs to support reverse engineering on consumer hardware.

Check it out: github.com/mrphrazer/reverser_

#reverseengineering #malware #malwareanalysis

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst