During this paper, authors intended arbitrary software and afterwards utilized it to some locked target to achieve access to the device’s inside sensors and logs with the help of neutralization and hardening techniques to forecast the efficiency. In addition, the authors elaborated over the contributions in their conclusions and suggested https://www.gmdsoft.com/