Training & Certification
Request a Proposal
User Behavior Analytics
By Compliance Requirement
Find a Partner
Events & Webcasts
Training & Certification
IT & Security Fundamentals
News & Press Releases
Windows: 64-Bit | PGP | SHA-1 HashWindows: 32-Bit | PGP | SHA-1 HashLinux: 64-Bit | PGP | SHA-1 Hash
Metasploit downloads can be verified with SHA-1 hashes or with PGP signatures. PGP signatures require the following public key.
Metasploit uses some of the same techniques as malware and malicious attackers to audit your security. For Metasploit to run properly, you must switch off anti-virus solutions and your local firewall before the installation and during its use. If you are not comfortable turning off defenses on this computer, consider installing Metasploit on a dedicated virtual machine (set virtual machine NIC to bridged mode). Ubuntu works great and doesn't incur any OS licensing fees.
Once the download is complete, run the installer and follow the step by step instructions. This installer contains all Metasploit editions.
An email containing your license key has been sent to the email address provided on the previous registration page. Insert your license key into Metasploit to activate Metasploit Community edition.
Note: It may take up to 15 mins to receive your license delivery email. Please check your spam folder, if you do not receive the email or cannot find the license key in the email, contact email@example.com. In order to comply with United States export regulations, all requests for Metasploit Community and Metasploit Pro outside of the United States or Canada must be reviewed by Rapid7 to determine if you are a restricted government end user before you receive a license key. In order to receive a copy of Metasploit you must provide a physical street address. When providing this address, please attempt to use English characters or English phonetics if possible. If you did not provide a physical street address on the registration page, please go back and do so or we will be unable to approve your request.
Our dynamic application security testing (DAST) solution crawls to the deepest, darkest corners of even the most modern and complex apps to effectively test for risk and get you the insight you need to remediate faster.
Our vulnerability management software monitors exposures in real-time and adapts to new threats with fresh data, ensuring you can always act at the moment of impact.