It's Go Time

You're just a few steps away from seeing how attackers would exploit your vulnerabilities with Metasploit Pro.

Step 1: Download

Windows: 64-Bit
Linux: 64-Bit

STEP 2: Install

  • Metasploit uses some of the same techniques as malware and malicious attackers to audit your security. For Metasploit to run properly, you must switch off anti-virus solutions and your local firewall before the installation and during its use. If you are not comfortable turning off defenses on this computer, consider installing Metasploit on a dedicated virtual machine (set virtual machine NIC to bridged mode). Ubuntu works great and doesn't incur any OS licensing fees.

  • Once the download is complete, run the installer and follow the step by step instructions. This installer contains all Metasploit editions.

STEP 3: Activate

  • An email containing your license key has been sent to the email address provided on the previous registration page. Insert your license key into Metasploit to activate Metasploit Pro edition.

Need help?

Here are some resources to help you.

Note: It may take up to 15 mins to receive your license delivery email. Please check your spam folder, if you do not receive the email or cannot find the license key in the email, contact info@rapid7.com. In order to comply with United States export regulations, all requests for Metasploit Community and Metasploit Pro outside of the United States or Canada must be reviewed by Rapid7 to determine if you are a restricted government end user before you receive a license key. In order to receive a copy of Metasploit you must provide a physical street address. When providing this address, please attempt to use English characters or English phonetics if possible. If you did not provide a physical street address on the registration page, please go back and do so or we will be unable to approve your request.

Looking to Test the Security of Your Web Apps?

Our dynamic application security testing (DAST) solution crawls to the deepest, darkest corners of even the most modern and complex apps to effectively test for risk and get you the insight you need to remediate faster.


Looking to Scan Your Network for Vulnerabilities?

Our vulnerability management software monitors exposures in real-time and adapts to new threats with fresh data, ensuring you can always act at the moment of impact.