The world of cybersecurity happens to be very dynamic. As technology progresses, the field witnesses novel innovations in the forms of offensive tools and defensive mechanisms that make it a constant battleground, where the fight between red teams and blue teams ensues habitually and often on a large scale. As a cybersecurity researcher, I have always been intrigued by what is allowed and what …