Writing your own Metasploit module