Snaffler
When an attacker has some presence in your network, they will try to move laterally. They will look for things on the network that will give them access to other systems and data. e.g. plain text credentials stored in files. Does that actually happen? Yes. Here’s a few