File structure in Metasploit is laid out in the scheme shown in the following figure:
We will cover the most relevant directories, which will aid us in building modules for Metasploit, through the following table: