The journey into the heart of a device often begins with obtaining its firmware. This crucial software, responsible for controlling a device's basic functions, can be accessed through file dumps. By acquiring these files, developers and researchers can analyze the inner workings of a system. However, these dumps are often encrypted, requiring speci