US-CERT report warns network admins about publicly available hacking tools used in current attacks. Covered tools include Remote Access Trojans, webshells, credential stealers, lateral movement frameworks, and command and control (C2) obfuscators. The report offers a high-level overview of specific attack tools, where and when each of them have been employed, and measures that admins can take to detect and limit attacks if theyre deployed against their networks. It could also help admins deal with vendors referring to the same hacking group with different names.”]