The weaponization phase of your Cyber Destroy Chain happens following reconnaissance has taken put as well as the attacker has learned all necessary details about possible targets, for example vulnerabilities. In the weaponization stage, all the attacker’s preparatory do the job culminates during the development of malware for use https://ieeexplore.ieee.org/document/9941250