Converting exploit to a Metasploit module