The weaponization phase of the Cyber Destroy Chain occurs following reconnaissance has taken place and also the attacker has identified all vital information about likely targets, which include vulnerabilities. From the weaponization phase, every one of the attacker’s preparatory work culminates while in the creation of malware for use https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network