Writing your Own Exploits as a Pentester