Is the exploit activity will go only trough Tor?
Can you clarify what you are trying to do. Not sure what “exploit” you’re referring to. Do you mean jail breaking a device so you can install a different OS?
Nobody at Whonix will help you to run exploit tools through the platform.
If you insist on asking for advice about it here you will be banned, since it is an anonymity platform, not a leg up for every dipshit who wants to create havoc on the Internet (we already have ICs for that purpose ).