The weaponization stage with the Cyber Destroy Chain occurs following reconnaissance has taken place as well as attacker has uncovered all vital information regarding opportunity targets, for instance vulnerabilities. From the weaponization phase, every one of the attacker’s preparatory operate culminates inside the creation of malware to be used https://ieeexplore.ieee.org/document/9941250