Ghidra for
AI agents.
Load PE, ELF, or Mach-O binaries. Disassemble x86-64 and ARM64. Lift to SSA-form IR. Decompile to typed C with inter-procedural type recovery. Find security vulnerabilities with concolic falsification. Fuzz with coverage-guided hybrid fuzzing. All through 62 structured MCP tools.
From raw binary to structured intelligence
Traditional RE tools give you a GUI. Aletheia gives your agent 62 JSON APIs to reason with.
Load
Parse ELF, PE, and Mach-O binaries. Extract sections, symbols, DWARF debug info, and relocations automatically.
Disassemble
Decode x86-64 and ARM64 instructions, discover functions via recursive descent, and build control flow graphs with petgraph.
Lift & Decompile
Lift to custom IR with 35 opcodes and explicit EFLAGS. Construct SSA form via Cytron phi insertion. Decompile to typed C.
Detect & Verify
Identify evasion techniques with MITRE ATT&CK mapping. Find buffer overflows, command injection, and use-after-free with concolic falsification. Fuzz with coverage-guided hybrid fuzzing.
Aletheia vs. the tools you already know
Ghidra is powerful. IDA is the standard. Binary Ninja innovates. Aletheia is built for a different user: agents.
| Capability | Aletheia | Ghidra | IDA Pro | Binary Ninja |
|---|---|---|---|---|
| AI agent integration (MCP) | 62 MCP tools, structured JSON | |||
| Structured API output | Native JSON, agent-optimised | Ghidra Script (Java/Python) | IDAPython | Python API |
| SSA-form IR | Full SSA, Cooper-Harvey-Kennedy | P-Code (not SSA) | Microcode (limited SSA) | BNIL (SSA variants) |
| Evasion / anti-analysis detection | Built-in, MITRE ATT&CK mapped | Plugins only | FLARE plugins | Plugins only |
| Crypto signature identification | Built-in, structured results | FindCrypt plugin | FindCrypt plugin | Sigkit |
| Full-text search across binary | Tantivy full-text engine | Basic string search | String / byte search | Cross-references |
| Headless / CLI mode | Native CLI + MCP server | analyzeHeadless | Batch mode | Headless |
| Memory safety | Pure Rust, zero unsafe | Java / JVM | C++ (manual) | C++ core |
| Multi-architecture | x86-64 & ARM64 | Many architectures | Many architectures | Many architectures |
| Data flow analysis | SSA def-use, taint, slicing | P-Code emulation | Microcode analysis | MLIL SSA slicing |
| Price | Free tier + Pro | Free (NSA) | $1,879+ / yr | $299+ |
Ghidra and IDA are battle-tested with decades of plugin ecosystem. Binary Ninja's IL design is excellent. Aletheia's advantage is agent ergonomics and structured output — it's complementary for AI-driven workflows.
The numbers behind Aletheia
A 16-crate Rust workspace. Clean-room implementation. Every algorithm from published literature.
What Aletheia actually does
Every capability exposed as a structured MCP tool. Built for agents that need to reason about binaries.
SSA-Form Decompilation Pipeline
A full decompilation pipeline from raw bytes to typed C. Instructions are lifted to a custom intermediate representation with 35 opcodes and explicit EFLAGS modelling. SSA construction uses the Cooper-Harvey-Kennedy algorithm with Cytron-style phi insertion — the same foundations as production compilers.
Five-pass type inference recovers integers, pointers, arrays, and structs. Inter-procedural propagation refines types across the call graph. Control flow structuring detects loops, if/else chains, and switch statements. Every pipeline stage is independently accessible through MCP tools.
62 MCP Tools
Every capability — loading, disassembly, decompilation, search, detection, data flow tracing, type recovery, concolic analysis, and hybrid fuzzing — is exposed as a structured MCP tool across 17 categories. Connect Aletheia to Claude and the agent orchestrates entire analysis workflows autonomously.
Evasion & Anti-Analysis Detection
Built-in detection for anti-debugging, anti-VM, packing, obfuscation, and other evasion techniques. Every finding is mapped to MITRE ATT&CK technique IDs for structured threat intelligence integration.
Crypto Signature Detection
Identifies cryptographic constants, S-boxes, and algorithm signatures embedded in binaries. Detects AES, DES, SHA-256, MD5 constants, and custom implementations through byte-pattern and structural analysis.
Tantivy Full-Text Search
Blazing-fast full-text search across all analysis artifacts — strings, function names, cross-references, and disassembly output. Powered by Tantivy, the Rust search engine library. Query results are structured JSON.
Data Flow & Taint Analysis
Trace how data moves through a binary. Backward slicing computes the minimal
instruction set influencing a target variable. Taint tracking follows untrusted
input from sources like recv and read to dangerous
sinks like system and exec. Both work across function boundaries.
Security Variant Detection
Combines concrete emulation with sparse symbolic shadow to find machine-checkable security property violations. Detects buffer overflows, command injection, format strings, use-after-free, integer overflow, and path traversal with parallel constraint solving.
Hybrid Coverage-Guided Fuzzing
AFL-compatible coverage-guided fuzzing integrated with concolic exploration. Corpus management, validation campaigns, and A/B comparison framework for exploration strategies. Scheduler automatically balances fuzzing with symbolic execution.
Start free. Scale when you're ready.
No credit card required. Upgrade as your analysis workload grows.
- 3 binaries per month
- Core disassembly
- x86-64 architecture
- Basic decompilation
- Community support
- Unlimited binaries
- All 62 MCP tools
- x86-64 + ARM64
- SSA decompilation
- Concolic falsification
- Hybrid fuzzing
- Evasion detection
- Priority support
- Everything in Pro
- On-prem deployment
- Custom detection rules
- CI/CD integration
- Dedicated support & SLAs
IDA Pro starts at $1,879/yr. Binary Ninja at $299+. Aletheia Pro gives you full agent integration and SSA decompilation at a fraction of the cost.
Frequently asked questions
What binary formats does Aletheia support?
How does this differ from using Ghidra with a Python script?
Can I use Aletheia for malware analysis?
What decompilation quality can I expect?
How do the MCP tools scale without overwhelming the AI's context window?
search and execute.
The agent discovers capabilities dynamically and writes JavaScript to chain tool calls inside a
sandboxed V8 isolate. Context overhead drops to ~1,100 tokens regardless of tool count —
a 91% reduction. The sandbox provides full security isolation with AST validation and
opaque credential bindings.
Can I use Aletheia without AI agents?
How does Aletheia handle stripped binaries?
Does Aletheia support taint analysis?
Aletheia is currently in closed development.
Join the waitlist to get early access when we open the beta. No spam. One email when it's ready.
Questions? Interested in collaborating?
[email protected]