Discovering previously unknown vulnerabilities represents a significant challenge in modern cybersecurity. These exceptional vulnerabilities target applications before the company is aware of the weakness and has released a update. The process of identifying and analyzing such zero-day vulnerabilities is extremely complex, often demanding expert