The weaponization stage in the Cyber Eliminate Chain occurs following reconnaissance has taken spot along with the attacker has discovered all important specifics of likely targets, including vulnerabilities. While in the weaponization stage, most of the attacker’s preparatory function culminates within the generation of malware for use from an https://ieeexplore.ieee.org/document/9941250