Session splicing is a method of evading Intrusion Detection Systems (IDS) where an attacker transmits data in numerous small packets to the target system, making it challenging for IDS to identify attack signatures. Which tool is commonly employed to execute session splicing attacks?