Cyber Attack Techniques | Remote Access Tools | Use of Legitimate Software for Malicious Purposes Velociraptor forensic tool used for command and control tunneling