The digital realm is a labyrinth of intricate infrastructures, each fortified with robust firewalls designed to protect sensitive data. Yet, for the skilled cyber intruder, these digital barriers present a tantalizing challenge. They constantly modify their methods to bypass these defenses, employing a variety of tools ranging from brute-force atta