Tim Blazytko
mrphrazer.bsky.social
Tim Blazytko
@mrphrazer.bsky.social
Binary Security Researcher, Chief Scientist at http://emproof.com and Trainer.
Website: https://synthesis.to
I’ll be teaching my next deobfuscation class at @re-verse.io (Orlando), Mar 2–5, 2026. Learn to dissect modern protections, devirtualize VMs, and simplify MBA expressions using symbolic execution, SMT solving, and synthesis.

Details: shop.binary.ninja/products/re-...
November 16, 2025 at 8:20 PM
The new version of my #BinaryNinja plugin Obfuscation Analysis (v1.2) adds recursive function inlining in the decompiler.

It collapses call-heavy code into a single function; analysis, constant propagation, DCE and other analyses work across boundaries.

github.com/mrphrazer/ob...
October 11, 2025 at 3:27 PM
The slides from our @reconmtl.bsky.social talk, "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" (CC @nicolo.dev ), are now online!

Slides: synthesis.to/presentation...

Plugin: github.com/mrphrazer/ob...
June 27, 2025 at 8:28 PM
New #BinaryNinja plugin: Obfuscation Analysis

Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly.

Co-authored by @nicolo.dev; available in the plugin manager.

github.com/mrphrazer/ob...
May 25, 2025 at 9:39 PM
Excited to teach my class on software deobfuscation in Paris at @hexacon.bsky.social , Oct 6–9, 2025!
Learn advanced techniques to defeat state-of-the-art obfuscation in DRMs & APT malware.

www.hexacon.fr/trainer/blaz...
May 5, 2025 at 9:01 PM
At @reconmtl.bsky.social, @nicolo.dev and I discuss the current state of MBA (de)obfuscation and their applications. We’ll also introduce a new #BinaryNinja plugin for simplifying MBAs in the decompiler.

Details: cfp.recon.cx/recon-2025/f...

I'll also give a training: recon.cx/2025/trainin...
April 7, 2025 at 4:13 PM
New heuristic in my #BinaryNinja plugin obfuscation_detection:
Duplicated Subgraphs uses iterative context hashing to spot repeated multi-block code. We merge each block’s signature with its successors over multiple rounds for efficiency.

Link: github.com/mrphrazer/ob...
March 14, 2025 at 2:46 AM
My class on code deobfuscation at REcon Montreal (June 24-27) is now open for registration! Learn how to analyze obfuscated code and break it by writing custom tools using symbolic execution, SMT solving, and program synthesis.

Details & Register: recon.cx/2025/trainin...
February 18, 2025 at 2:39 AM