Importing TCP server/browser-based exploits into Metasploit