Building the exploit base