This is a dedicated watch page for a single video.
Alex, a malicious actor, conducts a man-in-the-middle attack. To achieve this, he employs a rogue wireless access point and injects a malicious applet into all HTTP connections. Whenever the victims visit a webpage, the applet is executed. Which of the following tools is likely to be used by Alex to inject HTML code?