The weaponization stage on the Cyber Eliminate Chain occurs just after reconnaissance has taken place along with the attacker has found out all needed information about prospective targets, for instance vulnerabilities. During the weaponization stage, each of the attacker’s preparatory function culminates from the generation of malware to be https://ieeexplore.ieee.org/document/9941250