📄️ Weaponization
In the Weaponization Stage, the Attacker Generates and Develops their own Malicious Code using deliverable Payloads such as Word Documents, PDFs, etc. The Weaponization Stage aims to use the Malicious Weapon to Exploit the Target Machine and gain Initial Access.
🗃️ Password Attacks
4 items
🗃️ Phishing
2 items