Exploitation Frameworks in Penetration Testing