# Metasploit Modules

**URL:** <https://pentest.ws/tools/msf-modules>

PenTest.WS maintains a local copy of the Common Vulnerabilities and Exposures (CVE) database and is searchable from within the application.

![Metasploit Modules Search](https://1013683115-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHecEAvxd6Z8cSug6DhWr%2Fuploads%2FUzK1PSuDKkMBe2TfFvDt%2Fimage.png?alt=media\&token=ae0eca8c-d9c0-4ad1-b3fc-c499399bb2e7)

The search functionality will match any Metasploit Module containing all of the words entered into the search field. This includes the module's name, type, platform, source code and other fields.

### Metasploit Module Details

Clicking on a result in the search results provides detailed information about the module.

![Metasploit Module Details](https://1013683115-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHecEAvxd6Z8cSug6DhWr%2Fuploads%2FdJtKvbUVk95VRpR7josG%2Fimage.png?alt=media\&token=76820126-9ea2-4372-bbc5-fd8dbec59bfa)

## Tier Availability

**Metasploit Modules** is available on all tiers.
