The weaponization phase on the Cyber Eliminate Chain occurs following reconnaissance has taken spot along with the attacker has uncovered all important information regarding opportunity targets, for example vulnerabilities. While in the weaponization phase, all the attacker’s preparatory get the job done culminates in the development of malware for https://ieeexplore.ieee.org/document/9941250