01Get detailed module information for any Metasploit module
02Execute raw Metasploit commands through the MCP interface
03Run network scans using Nmap through Metasploit
04Execute vulnerability scans on target systems
050 GitHub stars
06Search for exploits by name, CVE, or other criteria