Implementing a check method for exploits in Metasploit