Emma, an experienced penetration tester employed at CyberShield Innovations, is assigned the responsibility of conducting a security assessment of web applications utilized within the organization. To fulfill this task, Emma leverages a tool designed to identify security vulnerabilities by intercepting a session between a client and server. This tool includes an intercepting proxy feature, enabling the inspection and modification of traffic between the browser and the target application. Additionally, it facilitates customized attacks and allows for testing the randomness of session tokens. Which of the following tools is employed by Emma in the described scenario?