The cohort's variety of individual tools covers just about any operating system it could possibly wish to attack.