This document discusses an automated tool written in Python that uses the pykd library to interact with WinDBG to automate the entire exploit writing process from a crash proof of concept to a working exploit for classic buffer overflows without any manual interaction. The tool finds the EIP overwrite location, registers pointing to buffers, bad characters, and a way to jump to shellcode to generate a successful exploit from a simple crash by automating the entire process.