The weaponization stage on the Cyber Kill Chain happens right after reconnaissance has taken spot along with the attacker has discovered all needed details about possible targets, like vulnerabilities. During the weaponization phase, all of the attacker’s preparatory work culminates within the development of malware to be used towards https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network