The weaponization phase of the Cyber Kill Chain takes place soon after reconnaissance has taken place as well as the attacker has uncovered all required information regarding likely targets, for example vulnerabilities. In the weaponization phase, all the attacker’s preparatory work culminates inside the generation of malware to be https://ieeexplore.ieee.org/document/9941250