Which tool is commonly used for maintaining persistent access and post-exploitation activities after initial compromise?