The weaponization phase in the Cyber Eliminate Chain occurs just after reconnaissance has taken put and the attacker has found all required details about possible targets, for example vulnerabilities. In the weaponization stage, each of the attacker’s preparatory perform culminates during the generation of malware for use against an https://ieeexplore.ieee.org/document/9941250