Chapter 8. Exploit Development with Python Metasploit and Immunity