Zero-day vulnerabilities pose a constant threat to organizations of all sizes. These hitherto unknown gaps in software and hardware can be exploited by malicious actors before patches are available, permitting swift and devastating attacks. The ever-evolving nature of cybercrime means that discovering and mitigating these vulnerabilities is an pers