The weaponization stage from the Cyber Destroy Chain happens immediately after reconnaissance has taken place plus the attacker has found out all necessary information regarding likely targets, like vulnerabilities. In the weaponization stage, every one of the attacker’s preparatory perform culminates during the creation of malware to be used https://ieeexplore.ieee.org/document/9941250