Metasploit is not a scanner and not a toy. It is a framework for controlled compromise. It becomes relevant where vulnerabilities do not merely exist, but are actively exploited. Initial access is only the beginning. The real value emerges afterward. Control, expansion, and persistence determine the success of an operation.
At the center is the Meterpreter. A memory-resident payload built for post-exploitation. Designed for direct access to compromised systems. File operations, credential access, process manipulation, and pivoting into internal networks all take place within an established session. Classical artifacts on disk are avoided. Its architecture is modular and can be extended dynamically. This is exactly where its strength in post-exploitation becomes visible.
That strength is also an attack surface.
Modern EDR and AV systems no longer detect only signatures, but behavior. In-memory techniques, API calls, thread structures, and network communication are continuously correlated. The typical patterns of Meterpreter are well known. An unmodified payload will be detected and stopped in many environments within a very short time.
This means Meterpreter is not a stealth tool. It is a framework that has to be adapted. Obfuscation, custom loaders, controlled execution paths, and clean OPSEC determine whether a session survives.
For Exfilion, Meterpreter is not an endpoint, but a building block. Embedded into individual tradecraft and aligned with the specific target environment.
Real attacks do not fail because of missing exploits. They fail because of detection.