Importing an HTTP exploit into Metasploit