The weaponization phase of the Cyber Eliminate Chain happens soon after reconnaissance has taken position along with the attacker has uncovered all vital information regarding potential targets, for example vulnerabilities. While in the weaponization phase, each of the attacker’s preparatory do the job culminates inside the generation of malware https://ieeexplore.ieee.org/document/9941250