Discovering previously unknown flaws represents a serious challenge in current cybersecurity. These exceptional flaws target software before the company is aware of the vulnerability and can released a update. The activity of identifying and analyzing such undisclosed vulnerabilities is highly complex, often necessitating specialized knowledge an