Finished exploits (for immediate deployment) don't have to be maintainable, and they only need to work once.