>id 5abe55
capabilities include disassembly, assembly, decompilation, graphing and scripting, and hundreds of other features
but essentially you reverse engineer applications to look for vulnerabilities
kek if you consider looking at code heavy lifting…
pick a really simple program to analyze at first so you can get the flavor without having to dig through the layers of complexity of more complex programs