To aid the work of network defenders and system administrators, we also provide advice on limiting the effectiveness of these tools and detecting their use on a network. Joint report on publicly available hacking tools