How Technology Augments Hackers to Hunt for Vulnerabilities Efficiently