We and anyone else in the field over the past 15 years have seen what Metasploit can do. There are all kinds of Metasploiters out there, but we're going to think about two kinds in particular. First, you have the intrepid noob. He downloaded Kali Linux and installed it in a virtual machine. Then, he/she fired up Metasploit and learned the basics: how to set an exploit, a payload and the options and then launch missiles! In this scenario, Metasploit quickly becomes the metaphorical hammer and every problem starts to look like a nail.
On the other hand, there is the seasoned security administrator who is comfortable with the command line. He/she fires up Metasploit and knows how to search for specific modules, as well as how to gather the appropriate information to populate options fields. However, he/she feels bound by what...