Cyber Weapons Study Reveals Tools Attackers Use After Network Break-In