Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?