The weaponization stage in the Cyber Eliminate Chain takes place after reconnaissance has taken place and also the attacker has found out all important specifics of opportunity targets, for example vulnerabilities. Inside the weaponization phase, all of the attacker’s preparatory function culminates during the creation of malware to be https://ieeexplore.ieee.org/document/9941250