Pardon the double post, but I was just testing the spoofing feature and I think there might be a bug. The spoofing works great (I have tried a BF2 fake players DoS with it, and it worked), but I think for every spoofed packet, the tool also sends a fragmented packet. Even when sending 1 spoofed packet, an additional fragmented packet appears to be sent immediately after it. It only appears to happen when using the -P feature to spoof the source address.
Here is a screenshot of this:
http://i33.tinypic.com/200ms.jpg
Notice how they come in pairs (if you compare the packet numbers and timestamps). 54.234.12.128 was just a random source IP I used, and the fake players still worked.
Here is another screenshot with detailed information about 1 of the fragmented packets:
http://i36.tinypic.com/sxeovm.jpg
Any ideas?