Building up the exploit base