Xerosploit Unleashed: Unraveling the Man-in-the-Middle Attack Framework