Tailoring exploits