The weaponization stage with the Cyber Destroy Chain happens just after reconnaissance has taken spot and also the attacker has found all essential details about potential targets, for instance vulnerabilities. Within the weaponization stage, most of the attacker’s preparatory work culminates in the development of malware to be used https://ieeexplore.ieee.org/document/9941250