Detecting Fake 0-Day Pocs And Common Enumeration Techniques | Threat Snapshot