Which automated exploitation framework is most commonly referenced in CEH for developing and testing exploits?