Zero-day exploits are among the most threatening vulnerabilities in the digital world. These unseen threats leverage unknown flaws in software before solutions are available, giving malicious actors a significant advantage. Cracking these zero-day exploits requires a deep understanding of system architectures and the ability to predict how vulnerab