In the ever-evolving digital landscape, cybersecurity has become paramount. As companies increasingly rely on technology, they become exposed to a myriad of cyber threats. To proactively mitigate these risks, vulnerability assessments emerges as a critical strategy. This comprises simulating real-world attacks on systems and networks to discover po