Take an undocumented executable of unknown origin. Trying /?, -h, –help from the command line yields nothing. Is it possible to discover if the executable supports any command line options by looking inside the executable? Possibly reverse engineering? What would be the best way of doing this?
I’m talking about a Windows executable, but would be interested to hear what different approaches would be needed with another OS.
For Windows, you can see this question about decompiling Windows executables. It should be relatively easy to at least discover the options (what they actually do is a different story).