During a penetration test, you decide to use a post-exploitation command and control framework to maintain access and execute .NET assemblies in the target's environment. You have gained initial access via a phishing campaign and determined that the target network uses a significant amount of Microsoft technology. Which tool would be most appropriate for managing the compromised hosts while staying stealthy and facilitating further network exploration?
Burp Suite
Covenant
WPScan
Responder