Exploit Selection and Customization Strategies