Back
Metasploit AI modules
webmetasploit.com·metasploit.com/
Metasploit is a standard cybersecurity tool relevant to AI safety discussions around AI-assisted offensive security, automated exploitation, and red-teaming; it serves as a reference point for evaluating AI capabilities in vulnerability exploitation scenarios.
Metadata
Importance: 25/100tool pagetool
Summary
Metasploit is the world's most widely used open-source penetration testing framework, maintained by Rapid7 and the open-source community. It enables security teams to verify vulnerabilities, conduct security assessments, and improve defensive capabilities through a large library of exploit modules.
Key Points
- •Open-source penetration testing framework with 37,000+ GitHub stars, widely used by security professionals worldwide.
- •Provides a constantly updated library of exploit and auxiliary modules targeting real-world CVEs and vulnerabilities.
- •Supports both free (Metasploit Framework) and commercial (Metasploit Pro) editions with varying feature sets.
- •Relevant to AI safety as a benchmark tool for evaluating AI-assisted vulnerability discovery and red-teaming capabilities.
- •Frequently cited in research on AI-enabled offensive security and automated exploitation capabilities.
Cited by 1 page
| Page | Type | Quality |
|---|---|---|
| Autonomous Cyber Attack Timeline | Analysis | 63.0 |
Cached Content Preview
HTTP 200Fetched Mar 20, 202613 KB
This site uses cookies for anonymized analytics. For more information or to change your cookie settings, view our [Cookie Policy](https://www.rapid7.com/privacy-policy/tracking-technologies/).


×

# The world’s most used penetration testing framework
## Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game.
[Star](https://github.com/rapid7/metasploit-framework)
[37,749](https://github.com/rapid7/metasploit-framework/stargazers)
[](https://github.com/rapid7/metasploit-framework)
### Get Metasploit
#### Open Source
### Metasploit Framework
[Download](https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html)
Latest
#### Commercial Support
### Metasploit Pro
[Download](https://www.rapid7.com/products/metasploit/download/)
Latest
Get visibility into your network with Rapid7's InsightVM
[30-Day Trial](https://www.rapid7.com/trial/insightvm)
[Compare Features](https://www.rapid7.com/products/metasploit/download/editions/)
[View More Projects](https://www.metasploit.com/download#projects)
* * *
[View All Modules](https://www.rapid7.com/db/?type=metasploit)
## [Latest Metasploit Modules](https://www.rapid7.com/db/?type=metasploit)
| Title | Date | Author |
| --- | --- | --- |
| [Land #20719, adds module for authenticated command injection in FreePBX filestore (CVE-2025-64328)\<br> \<br> Add authenticated RCE module for FreePBX filestore (CVE-2025-64328)](https://github.com/rapid7/metasploit-framework/commit/b3aa45fb09d322711f651ddd8e3a28b23e8208fb) | Mar 13, 2026 | [msutovsky-r7](https://github.com/msutovsky-r7) |
| [Land #20730, Allow toggling the SACL in LDAP queries\<br> \<br> # Release Notes\<br> This update modifies the ldap\_query module to skip querying the SACL (System Access Control List) on security descriptors by default. This behavior is now controlled by a new option, LDAP::QuerySacl. This change is necessary when using a non-privileged user to query security descriptors via LDAP; otherwise, querying the SACL will cause the entire query to be blocked, resulting in no security descriptors being returned.](https://github.com/rapid7/metasploit-framework/commit/31665e1b88434340bc9fbff7bfffbb0c17d4194f) | Mar 11, 2026 | [cdelafuente-r7](https://github.com/cdelafuente-r7) |
| [Revert "Land #20852, ex
... (truncated, 13 KB total)Resource ID:
6a0dd240c07f8164 | Stable ID: YTFhNmVkOG