Anatomy and structure of Metasploit