You can basically say ‘hey Mythos make me a working exploit of [major piece of software],’ go to sleep, and wake up to a working exploit, often a very complex one, and often exploiting some very old bugs.