Back
Metasploit AI modules
webmetasploit.com·metasploit.com/
Metasploit is a standard cybersecurity tool relevant to AI safety discussions around AI-assisted offensive security, automated exploitation, and red-teaming; it serves as a reference point for evaluating AI capabilities in vulnerability exploitation scenarios.
Metadata
Importance: 25/100tool pagetool
Summary
Metasploit is the world's most widely used open-source penetration testing framework, maintained by Rapid7 and the open-source community. It enables security teams to verify vulnerabilities, conduct security assessments, and improve defensive capabilities through a large library of exploit modules.
Key Points
- •Open-source penetration testing framework with 37,000+ GitHub stars, widely used by security professionals worldwide.
- •Provides a constantly updated library of exploit and auxiliary modules targeting real-world CVEs and vulnerabilities.
- •Supports both free (Metasploit Framework) and commercial (Metasploit Pro) editions with varying feature sets.
- •Relevant to AI safety as a benchmark tool for evaluating AI-assisted vulnerability discovery and red-teaming capabilities.
- •Frequently cited in research on AI-enabled offensive security and automated exploitation capabilities.
Cited by 1 page
| Page | Type | Quality |
|---|---|---|
| Autonomous Cyber Attack Timeline | Analysis | 63.0 |
Cached Content Preview
HTTP 200Fetched Apr 9, 20265 KB
Metasploit | Penetration Testing Software, Pen Testing Security | Metasploit
Your IE browser is out of date - Upgrade to the latest version of IE or Chrome for an optimal website experience. Upgrade IE Now
This site uses cookies for anonymized analytics. For more information or to change your cookie settings, view our Cookie Policy .
×
Get Started
Contribute
Metasploit Docs
Metasploit Pro Docs
Help
Download
Join Us On
Slack
GitHub
Twitter
Mastodon
The world’s most used penetration testing framework
Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game.
Star
37,882
Get Metasploit
Open Source
Metasploit
Framework
Download
Latest
Commercial Support
Metasploit
Pro
Download
Latest
Get visibility into your network with Rapid7's InsightVM
30-Day Trial
Compare Features
View More Projects
View All Modules
Latest Metasploit Modules
Title
Date
Author
Land #20999, removes older persistence module
Remove obsolete windows/local/persistence in favor of windows/persistence/registry
Mar 31, 2026
msutovsky-r7
Land #21029, adds module for Grav CMS (CVE-2025-50286)
Adds exploit module for Grav CMS (CVE-2025-50286)
Mar 31, 2026
msutovsky-r7
Land #20835, adds module unauthenticated command injection Eclipse Che machine-exec (CVE-2025-12548)
Add Eclipse Che machine-exec unauthenticated RCE (CVE-2025-12548)
Mar 25, 2026
msutovsky-r7
Land #20719, adds module for authenticated command injection in FreePBX filestore (CVE-2025-64328)
Add authenticated RCE module for FreePBX filestore (CVE-2025-64328)
Mar 13, 2026
msutovsky-r7
Land #20730, Allow toggling the SACL in LDAP queries
# Release Notes
This update modifies the ldap_query module to skip querying the SACL (System Access Control List) on security descriptors by default. This behavior is now controlled by a new option, LDAP::QuerySacl. This change is necessary when using a non-privileged user to query security descriptors via LDAP; otherwise, querying the SACL will cause the entire query to be blocked, resulting in no security descriptors being returned.
Mar 11, 2026
cdelafuente-r7
Revert "Land #20852, exposes encoder options for exploit and payloads"
This reverts commit 96958dedbbccb88d545356fed5950911f6160a4f, reversing
changes made to 8e03b6e98a094c8d1d54fba9489069f93ecd0cd9.
Mar 10, 2026
adfoster-r7
Contribute a Module
... (truncated, 5 KB total)Resource ID:
6a0dd240c07f8164 | Stable ID: sid_fElrDbFRSf