Tim Blazytko (@mr_phrazer) 's Twitter Profile
Tim Blazytko

@mr_phrazer

Binary Security Researcher, Chief Scientist at emproof.com and Trainer. Also at bsky.app/profile/mrphra…

ID: 4233162789

linkhttps://www.synthesis.to calendar_today20-11-2015 08:48:34

634 Tweet

5,5K Followers

250 Following

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

Last Thursday, I gave a webinar on anti-reverse engineering techniques like obfuscation, anti-debug, anti-tamper etc, including practical examples. Recording, slides and examples are now available. youtube.com/watch?v=Ie1eZS… github.com/emproof-com/we…

nicolodev (@nicolodev) 's Twitter Profile Photo

Disassembly algorithms are often a trade-off. My new blog post analyzes linear sweep and recursive traversal, exploring their strengths and weaknesses in a self-built disassemblers. nicolo.dev/en/blog/disass…

RE//verse (@reverseconf) 's Twitter Profile Photo

We are only two weeks out from some of the most engaging and immersive trainings available for security professionals, all happening at RE//verse! Today is the final day to register if you want your name professionally printed on your badge—late registrations will have names

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

My class on code deobfuscation at @recontml (June 24-27) is now open for registration! Learn how to analyze obfuscated code and break it by writing custom tools using symbolic execution, SMT solving, and program synthesis. Details & Register: recon.cx/2025/trainingS…

My class on code deobfuscation at @recontml (June 24-27) is now open for registration! Learn how to analyze obfuscated code and break it by writing custom tools using symbolic execution, SMT solving, and program synthesis.

Details & Register: recon.cx/2025/trainingS…
REcon (@reconmtl) 's Twitter Profile Photo

Come learn software Deobfuscation with Tim Blazytko at Recon 2025 June 23-26 #ReverseEngineering #Cybersecurity #malware #softwarecopyprotection For more details: recon.cx/2025/training.…

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

New heuristic in my #BinaryNinja plugin obfuscation_detection: Duplicate Subgraphs uses iterative context hashing to spot repeated multi-block code. We merge each block’s signature with its successors over multiple rounds for efficiency. Link: github.com/mrphrazer/obfu…

New heuristic in my #BinaryNinja plugin obfuscation_detection: 
Duplicate Subgraphs uses iterative context hashing to spot repeated multi-block code. We merge each block’s signature with its successors over multiple rounds for efficiency.

Link: github.com/mrphrazer/obfu…
LaurieWired (@lauriewired) 's Twitter Profile Photo

Just built an MCP for Ghidra. Now basically any LLM (Claude, Gemini, local...) can Reverse Engineer malware for you. With the right prompting, it automates a *ton* of tedious tasks. One-shot markups of entire binaries with just a click. Open source, on Github now.

Duncan Ogilvie 🍍 (@mrexodia) 's Twitter Profile Photo

Hacked together an IDA Pro MCP server in a few hours tonight! I gave Claude a simple crackme, but forgot to remove the source code from my project folder and in the end it cheated to find the solution🤦‍♂️ Variable renaming and retyping is implemented though, so that might be

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

Happy to announce that nicolodev and I will be giving a talk titled "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at REcon More information will follow in the coming days.

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

More details: nicolodev and I discuss the current state of MBA (de)obfuscation and their applications REcon We’ll also introduce a new #BinaryNinja plugin for simplifying MBAs in the decompiler. Details: cfp.recon.cx/recon-2025/fea…

More details: <a href="/nicolodev/">nicolodev</a> and I discuss the current state of MBA (de)obfuscation and their applications <a href="/reconmtl/">REcon</a> We’ll also introduce a new #BinaryNinja plugin for simplifying MBAs in the decompiler.

Details: cfp.recon.cx/recon-2025/fea…
Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

Excited to teach my class on software deobfuscation in Paris at Hexacon, Oct 6–9, 2025! Learn advanced techniques to defeat state-of-the-art obfuscation in DRMs & APT malware. hexacon.fr/trainer/blazyt…

Excited to teach my class on software deobfuscation in Paris at <a href="/hexacon_fr/">Hexacon</a>, Oct 6–9, 2025! 
Learn advanced techniques to defeat state-of-the-art obfuscation in DRMs &amp; APT malware.

hexacon.fr/trainer/blazyt…
Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

New #BinaryNinja plugin: Obfuscation Analysis Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly. Co-authored by nicolodev; available in the plugin manager. github.com/mrphrazer/obfu…