Towards Scalable Automated Vulnerability Scanning & Exploitation