Tim Blazytko

843 Followers
385 Following
68 Posts
AboutBinary Security Researcher, Trainer
Websitehttps://synthesis.to
Twitterhttps://twitter.com/mr_phrazer
Blueskyhttps://bsky.app/profile/mrphrazer.bsky.social
LocationBochum, Germany

Thanks to @elykdeer and the @binaryninja team for having me on the AI vs AI Binary Ninja stream. Great discussion on agentic RE, tooling, and feedback loops.

https://www.youtube.com/watch?v=TBqBpaqecMA

AI vs AI - Binary Ninja Live Stream

YouTube

The recording of my first Binary Cartography webinar is now public:

Agentic Reverse Engineering: How AI Agents Are Changing Binary Analysis

Topics: keygenning, cracking & anti-tamper removal

Recording: https://www.youtube.com/watch?v=DZcDaXTvDeE

Slides/code/samples: https://github.com/mrphrazer/binary-cartography/tree/main/2026-03-agentic_reverse_engineering

#reverseengineering #aiagents #malware

Agentic Reverse Engineering: How AI Agents Are Changing Binary Analysis

YouTube

RE: https://infosec.exchange/@mr_phrazer/115972031889474855

Agentic reverse engineering can do a lot, but obfuscation still breaks many analysis workflows in malware and commercial software.

If you want to learn how to build & steer automation for analyzing protected code, check out my training at @recon

https://recon.cx/2026/en/trainingSoftwareDeobfuscationTechniques.html

New blog post: Building a Pipeline for Agentic Malware Analysis

Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage

Link: https://synthesis.to/2026/03/18/agentic_malware_analysis.html

Github: https://github.com/mrphrazer/agentic-malware-analysis

#malware #reverseengineering #ai #cybersecurity

RE: https://infosec.exchange/@mr_phrazer/116166155203519881

I also published my Ghidra Headless MCP that follows similar design principles: https://github.com/mrphrazer/ghidra-headless-mcp

Recently my RE workflow moved into sandboxed VMs where agents have full control over the environment. I needed an MCP server that runs headless in the same sandbox and exposes way more of the #BinaryNinja API than others.

Here's the release: https://github.com/mrphrazer/binary-ninja-headless-mcp

GitHub - mrphrazer/binary-ninja-headless-mcp: Headless Binary Ninja MCP server — giving AI agents deep reverse-engineering capabilities via 180 tools.

Headless Binary Ninja MCP server — giving AI agents deep reverse-engineering capabilities via 180 tools. - mrphrazer/binary-ninja-headless-mcp

GitHub

New chapter: I've transitioned to a part-time Chief Scientist role at Emproof.

I’m shifting my focus to my independent work in reverse engineering:

trainings • consulting • tooling • research

Details: https://synthesis.to

Happy to bring my Software Deobfuscation Techniques training back to @recon - June 15–18, 2026 in Montreal!

Learn systematic approaches to defeating modern obfuscation found in DRM/anti-tamper & APT malware.

https://recon.cx/2026/en/trainingSoftwareDeobfuscationTechniques.html

#reverseengineering #malware

Happy to share that later today (Friday, Nov 14, at 10:00 PM CET / 16:00 ET), I’ll be live on the #BinaryNinja livestream to talk about (anti-)reverse engineering & code (de)obfuscation. I'll also showcase some of my plugins.

https://www.youtube.com/watch?v=GQtX7S_oXbY

The recording of our (CC @nicolodev talk "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @recon is now online!

Recording: https://www.youtube.com/watch?v=QxSGWk3MqaQ

Slides: https://synthesis.to/presentations/recon25_mba_obfuscation.pdf

#BinaryNinja Plugin: https://github.com/mrphrazer/obfuscation_analysis

#reverseengineering #malware

Recon 2025 - Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications

YouTube