Thanks to @elykdeer and the @binaryninja team for having me on the AI vs AI Binary Ninja stream. Great discussion on agentic RE, tooling, and feedback loops.

| About | Binary Security Researcher, Trainer |
| Website | https://synthesis.to |
| https://twitter.com/mr_phrazer | |
| Bluesky | https://bsky.app/profile/mrphrazer.bsky.social |
| Location | Bochum, Germany |
Thanks to @elykdeer and the @binaryninja team for having me on the AI vs AI Binary Ninja stream. Great discussion on agentic RE, tooling, and feedback loops.

The recording of my first Binary Cartography webinar is now public:
Agentic Reverse Engineering: How AI Agents Are Changing Binary Analysis
Topics: keygenning, cracking & anti-tamper removal
Recording: https://www.youtube.com/watch?v=DZcDaXTvDeE
Slides/code/samples: https://github.com/mrphrazer/binary-cartography/tree/main/2026-03-agentic_reverse_engineering

RE: https://infosec.exchange/@mr_phrazer/115972031889474855
Agentic reverse engineering can do a lot, but obfuscation still breaks many analysis workflows in malware and commercial software.
If you want to learn how to build & steer automation for analyzing protected code, check out my training at @recon
https://recon.cx/2026/en/trainingSoftwareDeobfuscationTechniques.html
New blog post: Building a Pipeline for Agentic Malware Analysis
Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage
Link: https://synthesis.to/2026/03/18/agentic_malware_analysis.html
Github: https://github.com/mrphrazer/agentic-malware-analysis
RE: https://infosec.exchange/@mr_phrazer/116166155203519881
I also published my Ghidra Headless MCP that follows similar design principles: https://github.com/mrphrazer/ghidra-headless-mcp
Recently my RE workflow moved into sandboxed VMs where agents have full control over the environment. I needed an MCP server that runs headless in the same sandbox and exposes way more of the #BinaryNinja API than others.
Here's the release: https://github.com/mrphrazer/binary-ninja-headless-mcp
New chapter: I've transitioned to a part-time Chief Scientist role at Emproof.
I’m shifting my focus to my independent work in reverse engineering:
trainings • consulting • tooling • research
Details: https://synthesis.to
Happy to bring my Software Deobfuscation Techniques training back to @recon - June 15–18, 2026 in Montreal!
Learn systematic approaches to defeating modern obfuscation found in DRM/anti-tamper & APT malware.
https://recon.cx/2026/en/trainingSoftwareDeobfuscationTechniques.html
Happy to share that later today (Friday, Nov 14, at 10:00 PM CET / 16:00 ET), I’ll be live on the #BinaryNinja livestream to talk about (anti-)reverse engineering & code (de)obfuscation. I'll also showcase some of my plugins.
The recording of our (CC @nicolodev talk "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @recon is now online!
Recording: https://www.youtube.com/watch?v=QxSGWk3MqaQ
Slides: https://synthesis.to/presentations/recon25_mba_obfuscation.pdf
#BinaryNinja Plugin: https://github.com/mrphrazer/obfuscation_analysis