Skip to content
Longterm Wiki
Back

Metasploit AI modules

web
metasploit.com·metasploit.com/

Metasploit is a standard cybersecurity tool relevant to AI safety discussions around AI-assisted offensive security, automated exploitation, and red-teaming; it serves as a reference point for evaluating AI capabilities in vulnerability exploitation scenarios.

Metadata

Importance: 25/100tool pagetool

Summary

Metasploit is the world's most widely used open-source penetration testing framework, maintained by Rapid7 and the open-source community. It enables security teams to verify vulnerabilities, conduct security assessments, and improve defensive capabilities through a large library of exploit modules.

Key Points

  • Open-source penetration testing framework with 37,000+ GitHub stars, widely used by security professionals worldwide.
  • Provides a constantly updated library of exploit and auxiliary modules targeting real-world CVEs and vulnerabilities.
  • Supports both free (Metasploit Framework) and commercial (Metasploit Pro) editions with varying feature sets.
  • Relevant to AI safety as a benchmark tool for evaluating AI-assisted vulnerability discovery and red-teaming capabilities.
  • Frequently cited in research on AI-enabled offensive security and automated exploitation capabilities.

Cited by 1 page

PageTypeQuality
Autonomous Cyber Attack TimelineAnalysis63.0

Cached Content Preview

HTTP 200Fetched Mar 20, 202613 KB
This site uses cookies for anonymized analytics. For more information or to change your cookie settings, view our [Cookie Policy](https://www.rapid7.com/privacy-policy/tracking-technologies/).

![](https://www.metasploit.com/includes/images/close-white.svg)

![](https://www.metasploit.com/includes/images/menu.svg)

×

![](https://www.metasploit.com/includes/images/metasploit-logo-light-external-use.svg)![](https://www.metasploit.com/includes/images/metasploit-logo-light-external-use-name-only.svg)

# The world’s most used penetration testing framework

## Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game.

[![](https://www.metasploit.com/includes/images/star-icon.svg)Star](https://github.com/rapid7/metasploit-framework)

[37,749](https://github.com/rapid7/metasploit-framework/stargazers)

[![](https://www.metasploit.com/includes/images/github-icon.svg)](https://github.com/rapid7/metasploit-framework)

### Get Metasploit

#### Open Source

### Metasploit   Framework

[Download](https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html)

Latest

#### Commercial Support

### Metasploit   Pro

[Download](https://www.rapid7.com/products/metasploit/download/)

Latest

Get visibility into your network with Rapid7's InsightVM

[30-Day Trial](https://www.rapid7.com/trial/insightvm)

[Compare Features](https://www.rapid7.com/products/metasploit/download/editions/)

[View More Projects](https://www.metasploit.com/download#projects)

* * *

[View All Modules](https://www.rapid7.com/db/?type=metasploit)

## [Latest Metasploit Modules](https://www.rapid7.com/db/?type=metasploit)

| Title | Date | Author |
| --- | --- | --- |
| [Land #20719, adds module for authenticated command injection in FreePBX filestore (CVE-2025-64328)\<br> \<br> Add authenticated RCE module for FreePBX filestore (CVE-2025-64328)](https://github.com/rapid7/metasploit-framework/commit/b3aa45fb09d322711f651ddd8e3a28b23e8208fb) | Mar 13, 2026 | [msutovsky-r7](https://github.com/msutovsky-r7) |
| [Land #20730, Allow toggling the SACL in LDAP queries\<br> \<br> # Release Notes\<br> This update modifies the ldap\_query module to skip querying the SACL (System Access Control List) on security descriptors by default. This behavior is now controlled by a new option, LDAP::QuerySacl. This change is necessary when using a non-privileged user to query security descriptors via LDAP; otherwise, querying the SACL will cause the entire query to be blocked, resulting in no security descriptors being returned.](https://github.com/rapid7/metasploit-framework/commit/31665e1b88434340bc9fbff7bfffbb0c17d4194f) | Mar 11, 2026 | [cdelafuente-r7](https://github.com/cdelafuente-r7) |
| [Revert "Land #20852, ex

... (truncated, 13 KB total)
Resource ID: 6a0dd240c07f8164 | Stable ID: YTFhNmVkOG