The weaponization stage with the Cyber Destroy Chain takes place after reconnaissance has taken spot plus the attacker has found all essential information about prospective targets, which include vulnerabilities. Within the weaponization stage, each of the attacker’s preparatory work culminates within the creation of malware to be used versus https://ieeexplore.ieee.org/document/9941250