Unleashing Efficiency: Meet Daemons and How Hackers Use Them #cybersecurity