vulnerability hunting