“After gaining initial access, adversaries leverage techniques such as launching web injection attacks, deploying web shells, and/or using commercial off-the-shelf frameworks that deploy web ...