The weaponization phase of the Cyber Destroy Chain occurs soon after reconnaissance has taken location as well as attacker has found all needed specifics of potential targets, like vulnerabilities. Within the weaponization stage, every one of the attacker’s preparatory do the job culminates from the creation of malware to https://ieeexplore.ieee.org/document/9941250