I did not put a lot of effort into writing code for these exploits. But I understand the way some early network exploits allowed a third party to take over a connection, cause a denial of service, or run arbitrary shellcode. With sufficient time and focus, I can write code for these exploits.