A complex attacker tool used by experienced threat actors. It integrates with the lowest levels of the operating system. When a program attempts to list files, processes, or network connections, it presents a sanitized version of the output, eliminating any incriminating output. The goal is to completely hide the activities of the attacker on the local system.