The weaponization stage on the Cyber Destroy Chain takes place following reconnaissance has taken place plus the attacker has identified all required information regarding probable targets, for example vulnerabilities. Within the weaponization stage, the entire attacker’s preparatory function culminates inside the creation of malware to be used in opposition https://ieeexplore.ieee.org/document/9941250