Malicious code is becoming increasingly common to find, both for traditional IT software as well as for OT, IoT and other embedded and unmanaged devices. Malicious actors are targeting public exploit proofs-of-concept (PoCs), typically porting them into something more useful or less detectable by adding payloads, packaging them into a malware module or rewriting them to run in other execution environments.