Visibility Assessment and Automated Breach Emulation