Converting an exploit to a Metasploit module