What is Metasploit in Cybersecurity? Uses, Features and Key Benefits