A module is a piece of software that the Metasploit Framework uses to perform a task, such as exploiting or scanning a target. A module can be an exploit module, auxiliary module, or post-exploitation module.
Before you can configure and run an exploit, you need to search for the module. The console includes the ability to search for modules using search operators.
You use search operators to create a query based on a specific module name, path, platform, author, CVE ID, BID, OSDVB ID, module type, or application. The search returns a list of results that match the query.
The following are search operators that are available:
To search for a module, use the following syntax:
1$ search <search operator>:<search term>
Searching for a Module
search command along with the search operator to search for a module
1msf-pro > search platform:Windows2msf-pro > search type:exploit3msf-pro > search author:hd4msf-pro > search app:client5msf-pro > search name:ms08-067
Showing All Exploit Modules
show command to view a list of the exploits that are available.
1msf-pro > show exploits
This can take a few minutes. There are thousands of modules.