The weaponization phase with the Cyber Eliminate Chain occurs after reconnaissance has taken area as well as attacker has identified all necessary details about possible targets, including vulnerabilities. While in the weaponization phase, every one of the attacker’s preparatory operate culminates inside the development of malware for use against https://ieeexplore.ieee.org/document/9941250