Move over, Cobalt Strike, there's a new post-exploit toolNew post-exploitation tool Splinter enables attackers to execute malicious commands and remains undetected by self-deleting after use.