Tim Blazytko
@mrphrazer.bsky.social
📤 259
📥 152
📝 22
Binary Security Researcher & Trainer Website:
https://synthesis.to
pinned post!
Happy to bring my Software Deobfuscation Techniques training back to
@reconmtl.bsky.social
- June 15–18, 2026 in Montreal! Learn systematic approaches to defeating modern obfuscation found in DRM/anti-tamper & APT malware.
recon.cx/2026/en/trai...
20 days ago
1
5
1
New chapter: I've transitioned to a part-time Chief Scientist role at
@emproofsecurity.bsky.social
. I’m shifting my focus to my independent work in reverse engineering: trainings • consulting • tooling • research Details:
synthesis.to
15 days ago
0
2
1
Happy to bring my Software Deobfuscation Techniques training back to
@reconmtl.bsky.social
- June 15–18, 2026 in Montreal! Learn systematic approaches to defeating modern obfuscation found in DRM/anti-tamper & APT malware.
recon.cx/2026/en/trai...
20 days ago
1
5
1
Happy to share that later today (Friday, Nov 14, at 10:00 PM CET / 16:00 ET), I’ll be live on the
#BinaryNinja
livestream to talk about (anti-)reverse engineering & code (de)obfuscation. I'll also showcase some of my plugins.
www.youtube.com/watch?v=GQtX...
loading . . .
Binary Ninja Live Stream: Nov 14th, 2025
YouTube video by VECTOR 35
https://www.youtube.com/watch?v=GQtX7S_oXbY
3 months ago
0
1
0
reposted by
Tim Blazytko
Laurent Clévy
4 months ago
Impressive reverse engineering kung fu against widevine L3 by Felipe (
x.com/_localo_
) !
#hacklu
Cc
@mrphrazer.bsky.social
add a skeleton here at some point
1
3
2
The recording of our (CC
@nicolo.dev
) talk "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at
@reconmtl.bsky.social
is now online! Recording:
www.youtube.com/watch?v=QxSG...
Slides:
synthesis.to/presentation...
#BinaryNinja
Plugin:
github.com/mrphrazer/ob...
loading . . .
Recon 2025 - Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications
YouTube video by Recon Conference
https://www.youtube.com/watch?v=QxSGWk3MqaQ
4 months ago
0
7
7
The new version of my
#BinaryNinja
plugin Obfuscation Analysis (v1.2) adds recursive function inlining in the decompiler. It collapses call-heavy code into a single function; analysis, constant propagation, DCE and other analyses work across boundaries.
github.com/mrphrazer/ob...
loading . . .
4 months ago
1
5
3
We at
@emproofsecurity.bsky.social
open-sourced a free firmware reverse engineering workshop for self-study. Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included.
github.com/emproof-com/...
loading . . .
GitHub - emproof-com/workshop_firmware_reverse_engineering: Workshop on firmware reverse engineering
Workshop on firmware reverse engineering. Contribute to emproof-com/workshop_firmware_reverse_engineering development by creating an account on GitHub.
https://github.com/emproof-com/workshop_firmware_reverse_engineering
5 months ago
0
5
2
Reminder: If you’re interested in learning how to analyze and deal with obfuscated code, you’re welcome to join my training at
@hexacon.bsky.social
from October 6-9. You can still register here:
www.hexacon.fr/trainer/blaz...
add a skeleton here at some point
7 months ago
0
2
0
reposted by
Tim Blazytko
Max 'Libra' Kersten
8 months ago
Based on research by
@mrphrazer.bsky.social
and
@mu00d8.bsky.social
, presented at RECon 2024, I used graph theory code from Ghidra's codebase to select the order in which functions are sent to the LLM, ensuring as much context as possible is retained. The script is aptly named GhidrAI! 5/n
1
3
1
The slides from our
@reconmtl.bsky.social
talk, "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" (CC
@nicolo.dev
), are now online! Slides:
synthesis.to/presentation...
Plugin:
github.com/mrphrazer/ob...
8 months ago
0
10
6
Tomorrow at 3:30 pm,
@nicolo.dev
and I will present our talk “Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications” at
@reconmtl.bsky.social
! Details:
cfp.recon.cx/recon-2025/t...
Plugin release:
github.com/mrphrazer/ob...
loading . . .
Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications Recon 2025
From gaming anti-cheat and DRM solutions to malware, Mixed Boolean-Arithmetic (MBA) obfuscation hides critical computations behind intricate Boolean and arithmetic transformations. In this talk, we de...
https://cfp.recon.cx/recon-2025/talk/BKBQ37/
8 months ago
0
10
3
Reminder: If you’re interested in code deobfuscation, you’re welcome to join my training at
@reconmtl.bsky.social
Montréal from June 24-27. You can still register here:
recon.cx/2025/trainin...
add a skeleton here at some point
9 months ago
0
1
0
Honored to join
@jstrosch.bsky.social
on his podcast "Behind the Binary"! We discussed my RE journey, identifying & analyzing obfuscated code, software protection in industry vs malware, the dynamic between building & breaking protections, and others.
open.spotify.com/episode/7yJB...
add a skeleton here at some point
9 months ago
0
5
1
New
#BinaryNinja
plugin: Obfuscation Analysis Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly. Co-authored by
@nicolo.dev
; available in the plugin manager.
github.com/mrphrazer/ob...
loading . . .
9 months ago
1
21
10
Excited to teach my class on software deobfuscation in Paris at
@hexacon.bsky.social
, Oct 6–9, 2025! Learn advanced techniques to defeat state-of-the-art obfuscation in DRMs & APT malware.
www.hexacon.fr/trainer/blaz...
10 months ago
0
8
1
Reminder: Training registrations are still open for my deobfuscation training at REcon Montreal. Secure your spot before prices go up on May 1!
add a skeleton here at some point
10 months ago
0
2
0
At
@reconmtl.bsky.social
,
@nicolo.dev
and I discuss the current state of MBA (de)obfuscation and their applications. We’ll also introduce a new
#BinaryNinja
plugin for simplifying MBAs in the decompiler. Details:
cfp.recon.cx/recon-2025/f...
I'll also give a training:
recon.cx/2025/trainin...
11 months ago
0
7
5
New heuristic in my
#BinaryNinja
plugin obfuscation_detection: Duplicated Subgraphs uses iterative context hashing to spot repeated multi-block code. We merge each block’s signature with its successors over multiple rounds for efficiency. Link:
github.com/mrphrazer/ob...
11 months ago
1
9
6
reposted by
Tim Blazytko
RE//verse
12 months ago
RE//verse training registration closes today! Have to finalize count for the hotel. If you still want to join after registration closes, contact us ASAP as some extra slots may be available.
https://re-verse.io/#trainings
0
2
2
My class on code deobfuscation at REcon Montreal (June 24-27) is now open for registration! Learn how to analyze obfuscated code and break it by writing custom tools using symbolic execution, SMT solving, and program synthesis. Details & Register:
recon.cx/2025/trainin...
12 months ago
0
9
3
Last Thursday, I gave a webinar on anti-reverse engineering techniques like obfuscation, anti-debug, anti-tamper etc, including practical examples. Recording, slides and examples are now available. Recording:
www.youtube.com/watch?v=Ie1e...
Slides, Code & Samples:
github.com/emproof-com/...
loading . . .
Webinar: Software Protection -- Safeguarding Code Against Reverse Engineering
YouTube video by emproof
https://www.youtube.com/watch?v=Ie1eZSiMEJ8
about 1 year ago
1
5
1
The line-up for
@re-verse.io
is impressive, but one talk I’m particularly excited about is from Vikas Gupta and Peter Garba: “Standing on the Shoulders of Giants: De-Obfuscating WebAssembly using LLVM”
re-verse.sessionize.com/session/763329
loading . . .
https://re-verse.sessionize.com/session/
[email protected]
about 1 year ago
0
4
0
The schedule of RE//verse is out now and contains some pretty interesting talks on reverse engineering and code (de)obfuscation! I'll also give my deobfuscation training there:
shop.binary.ninja/products/re-...
add a skeleton here at some point
about 1 year ago
0
9
3
My next (de)obfuscation training will be at
@re-verse.io
, Feb 24-27 in Orlando. You’ll learn to identify, analyze, understand, and break protected code in both malware and commercial applications. Register:
shop.binary.ninja/products/re-...
loading . . .
RE//verse Training - Software Deobfuscation Techniques with Tim Blazytko
Get to know state-of-the-art code obfuscation techniques, how they complicate reverse engineering, and how to use different deobfuscation techniques to break them in these hands-on sessions at RE//ver...
https://shop.binary.ninja/products/re-verse-training-software-deobfuscation-techniques
about 1 year ago
0
9
3
you reached the end!!
feeds!
log in