Skip to content
Longterm Wiki
Back

Metasploit AI modules

web
metasploit.com·metasploit.com/

Metasploit is a standard cybersecurity tool relevant to AI safety discussions around AI-assisted offensive security, automated exploitation, and red-teaming; it serves as a reference point for evaluating AI capabilities in vulnerability exploitation scenarios.

Metadata

Importance: 25/100tool pagetool

Summary

Metasploit is the world's most widely used open-source penetration testing framework, maintained by Rapid7 and the open-source community. It enables security teams to verify vulnerabilities, conduct security assessments, and improve defensive capabilities through a large library of exploit modules.

Key Points

  • Open-source penetration testing framework with 37,000+ GitHub stars, widely used by security professionals worldwide.
  • Provides a constantly updated library of exploit and auxiliary modules targeting real-world CVEs and vulnerabilities.
  • Supports both free (Metasploit Framework) and commercial (Metasploit Pro) editions with varying feature sets.
  • Relevant to AI safety as a benchmark tool for evaluating AI-assisted vulnerability discovery and red-teaming capabilities.
  • Frequently cited in research on AI-enabled offensive security and automated exploitation capabilities.

Cited by 1 page

PageTypeQuality
Autonomous Cyber Attack TimelineAnalysis63.0

Cached Content Preview

HTTP 200Fetched Apr 9, 20265 KB
Metasploit | Penetration Testing Software, Pen Testing Security | Metasploit 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
 
 
 
 

 
 
 Your IE browser is out of date - Upgrade to the latest version of IE or Chrome for an optimal website experience. Upgrade IE Now 
 
 
 
 
 
 
 
 This site uses cookies for anonymized analytics. For more information or to change your cookie settings, view our Cookie Policy .

 
 
 
 
 
 
 
 
 
 
 
 × 
 
 
 
 
 
 
 
 
 Get Started 

 Contribute 

 Metasploit Docs 

 Metasploit Pro Docs 

 Help 

 
 
 Download 
 
 
 
 
 Join Us On

 
 Slack 

 GitHub 

 Twitter 

 Mastodon 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 The world’s most used penetration testing framework

 Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game.

 
 
 
 Star 
 
 
 37,882 
 
 
 
 
 
 
 
 
 
 
 Get Metasploit

 
 
 
 
 
 Open Source

 Metasploit 
Framework

 Download 
 Latest 
 
 
 
 
 Commercial Support

 Metasploit 
Pro

 Download 
 Latest 
 
 
 
 
 
 Get visibility into your network with Rapid7's InsightVM 
 30-Day Trial 

 
 
 
 Compare Features 

 View More Projects 
 
 
 
 
 
 

 
 
 
 
 
 
 
 
 View All Modules 
 Latest Metasploit Modules 

 
 
 
 Title 
 Date 
 Author 
 
 
 Land #20999, removes older persistence module
 
 Remove obsolete windows/local/persistence in favor of windows/persistence/registry 
 Mar 31, 2026 
 msutovsky-r7 
 
 
 Land #21029, adds module for Grav CMS (CVE-2025-50286)
 
 Adds exploit module for Grav CMS (CVE-2025-50286) 
 Mar 31, 2026 
 msutovsky-r7 
 
 
 Land #20835, adds module unauthenticated command injection Eclipse Che machine-exec (CVE-2025-12548)
 
 Add Eclipse Che machine-exec unauthenticated RCE (CVE-2025-12548) 
 Mar 25, 2026 
 msutovsky-r7 
 
 
 Land #20719, adds module for authenticated command injection in FreePBX filestore (CVE-2025-64328)
 
 Add authenticated RCE module for FreePBX filestore (CVE-2025-64328) 
 Mar 13, 2026 
 msutovsky-r7 
 
 
 Land #20730, Allow toggling the SACL in LDAP queries
 
 # Release Notes
 This update modifies the ldap_query module to skip querying the SACL (System Access Control List) on security descriptors by default. This behavior is now controlled by a new option, LDAP::QuerySacl. This change is necessary when using a non-privileged user to query security descriptors via LDAP; otherwise, querying the SACL will cause the entire query to be blocked, resulting in no security descriptors being returned. 
 Mar 11, 2026 
 cdelafuente-r7 
 
 
 Revert "Land #20852, exposes encoder options for exploit and payloads"
 
 This reverts commit 96958dedbbccb88d545356fed5950911f6160a4f, reversing
 changes made to 8e03b6e98a094c8d1d54fba9489069f93ecd0cd9. 
 Mar 10, 2026 
 adfoster-r7 
 
 
 Contribute a Module 
 
 
 

 
 
 
 

... (truncated, 5 KB total)
Resource ID: 6a0dd240c07f8164 | Stable ID: sid_fElrDbFRSf