The weaponization step in the Cyber Kill Chain model involves creating or repurposing malware based on the information gathered during reconnaissance to exploit vulnerabilities in the target's system. This step culminates in the preparation of the malware to be delivered to the victim2. References: * Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) * Cyber Kill Chain