The Metasploit framework provides penetration testers with an unprecedented ability to find and exploit vulnerable machines, but a good penetration tester knows exploitation is only the beginning. Metasploit post exploitation modules allow penetration testers to gather data from exploited machines, including hashes, tokens, application passwords and much more. During this presentation we will discuss useful post exploitation modules, developing post exploitation modules, and contributing modules to the Metasploit framework.