Tim Blazytko
About
Binary Security Researcher, Trainer
Location
Bochum, Germany
2026-02-02

New chapter: I've transitioned to a part-time Chief Scientist role at Emproof.

I’m shifting my focus to my independent work in reverse engineering:

trainings • consulting • tooling • research

Details: synthesis.to

2026-01-28

Happy to bring my Software Deobfuscation Techniques training back to @recon - June 15–18, 2026 in Montreal!

Learn systematic approaches to defeating modern obfuscation found in DRM/anti-tamper & APT malware.

recon.cx/2026/en/trainingSoftw

#reverseengineering #malware

2025-11-13

Happy to share that later today (Friday, Nov 14, at 10:00 PM CET / 16:00 ET), I’ll be live on the #BinaryNinja livestream to talk about (anti-)reverse engineering & code (de)obfuscation. I'll also showcase some of my plugins.

youtube.com/watch?v=GQtX7S_oXbY

2025-10-15

The recording of our (CC @nicolodev talk "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @recon is now online!

Recording: youtube.com/watch?v=QxSGWk3MqaQ

Slides: synthesis.to/presentations/rec

#BinaryNinja Plugin: github.com/mrphrazer/obfuscati

#reverseengineering #malware

2025-10-11

The new version of my #BinaryNinja plugin Obfuscation Analysis (v1.2) adds recursive function inlining in the decompiler.

It collapses call-heavy code into a single function; analysis, constant propagation, DCE and other analyses work across boundaries.

github.com/mrphrazer/obfuscati

#reverseengineering

2025-09-30

We at emproof open-sourced a free firmware reverse engineering workshop for self-study.

Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included.

github.com/emproof-com/worksho

#reverseengineering

2025-06-27

The slides from our @recon talk, "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" (CC @nicolodev are now online!

Slides: synthesis.to/presentations/rec

Plugin: github.com/mrphrazer/obfuscati

2025-06-26

Tomorrow at 3:30 pm, Nicolò Altamura and I will present our talk “Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications” at @recon

Details: cfp.recon.cx/recon-2025/talk/B
Plugin release: github.com/mrphrazer/obfuscati

Tim Blazytko boosted:
2025-06-05

My class on code deobfuscation at REcon Montreal (June 24-27) is now open for registration! Learn how to analyze obfuscated code and break it by writing custom tools using symbolic execution, SMT solving, and program synthesis.

Details & Register: recon.cx/2025/trainingSoftware

2025-05-25

New #BinaryNinja plugin: Obfuscation Analysis

Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly.

Co-authored by @nicolodev ; available in the plugin manager.

Check it out: github.com/mrphrazer/obfuscati

#reverseengineering #malware #cybersecurity

2025-05-05

Excited to teach my class on software deobfuscation in Paris at @hexacon_fr Oct 6–9, 2025!
Learn advanced techniques to defeat state-of-the-art obfuscation in DRMs & APT malware.

hexacon.fr/trainer/blazytko/

#reverseengineering #malware #malwareanalysis #softwaresecurity

2025-04-07

At @recon , @nicolodev and I discuss the current state of MBA (de)obfuscation and their applications. We’ll also introduce a new #BinaryNinja plugin for simplifying MBAs in the decompiler.

Details: cfp.recon.cx/recon-2025/featur

I'll also give a training: recon.cx/2025/trainingSoftware

#reverseengineering #malware

2025-03-14

New heuristic in my #BinaryNinja plugin obfuscation_detection:

Duplicated Subgraphs uses iterative context hashing to spot repeated multi-block code. We merge each block’s signature with its successors over multiple rounds for efficiency.

Link: github.com/mrphrazer/obfuscati

#reverseengineering

2025-02-18

My class on code deobfuscation at REcon Montreal (June 24-27) is now open for registration! Learn how to analyze obfuscated code and break it by writing custom tools using symbolic execution, SMT solving, and program synthesis.

Details & Register: recon.cx/2025/trainingSoftware

2025-01-27

Last Thursday, I gave a webinar on anti-reverse engineering techniques like obfuscation, anti-debug, anti-tamper etc, including practical examples. Recording, slides and examples are now available.

Recording: youtube.com/watch?v=Ie1eZSiMEJ8

Slides, code & samples: github.com/emproof-com/webinar

2025-01-10

The line-up for RE//verse is impressive, but one talk I’m particularly excited about is from Vikas Gupta and Peter Garba:

“Standing on the Shoulders of Giants: De-Obfuscating WebAssembly using LLVM”

re-verse.sessionize.com/sessio

#reverseengineering

2024-12-09

I can also be found on Bluesky: bsky.app/profile/mrphrazer.bsk

2024-05-02

New version of my #BinaryNinja plugin obfuscation_detection.

New features detect:
* RC4 implementations (KSA + PRGA)
* functions with a high loop frequency (potential performance bottlenecks)
* irreducible loops (aggressive optimizations & obfuscation)

github.com/mrphrazer/obfuscati

#malware #malwareanalysis

2024-04-10

Happy to present "Unleashing AI: The Future of Reverse Engineering with Large Language Models" with @mu00d8 at
@recon We'll cover current & future RE applications, running offline models and enhancing results by merging LLMs with static analysis.

recon.cx/2024/presentations.ht

#reverseengineering #malwareanalysis #malware #AI #LLM #REcon2024

2024-03-25

🚀 Join me at TyphoonCon 2024 in South Korea for an intensive Software Deobfuscation Techniques training from May 27-29!

You'll learn how to analyze and break obfuscated code. Key learnings include

🔍 Unveiling state-of-the-art strategies in code obfuscation and their undoing.

🛠️ Mastering compiler optimizations and SMT-based program analysis.

⚙️ Harnessing the power of symbolic execution and program synthesis for practical problem-solving.

📐 Crafting disassemblers for VM-based obfuscation and simplify complex arithmetic expressions.

🔗 Details & Registration: typhooncon.com/blog/conitems/s

#reverseengineering #softwaredeobfuscation #gamesecurity #anticheat #softwaresecurity #malwareanalysis #antipiracy #malware #training #TyphoonCon24

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst