The weaponization stage from the Cyber Kill Chain occurs soon after reconnaissance has taken place along with the attacker has identified all vital details about prospective targets, which include vulnerabilities. During the weaponization stage, all the attacker’s preparatory perform culminates in the creation of malware for use against an https://ieeexplore.ieee.org/document/9941250