In the shadowy realm of cyberspace, a silent conflict rages. Attackers, wielding sophisticated tools, execute cyber operations with devastating consequences. These malicious actors operate with hidden methods, exploiting vulnerabilities to compromise critical networks. Understanding the intricate methods employed by cyber agents is paramount in our