The framework consists of a tool with an environment which allows the use of exploit code against a remote machine. It is riskier to use because it implies that there are existing exploits on the workstation which is installed upon and all those that are connected to.