From Testing to Technique: Scaling Offensive Security Techniques